Debian DSA-5341-1 : wpewebkit - security update

high Nessus Plugin ID 171106


The remote Debian host is missing one or more security-related updates.


The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5341 advisory.

- A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13, iOS 16.1 and iPadOS 16, Safari 16.1. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2022-42826)

- The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.2, macOS Monterey 12.6.3, tvOS 16.3, Safari 16.3, watchOS 9.3, iOS 16.3 and iPadOS 16.3, macOS Big Sur 11.7.3.
Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2023-23517, CVE-2023-23518)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Upgrade the wpewebkit packages.

For the stable distribution (bullseye), these problems have been fixed in version 2.38.4-1~deb11u1.

See Also

Plugin Details

Severity: High

ID: 171106

File Name: debian_DSA-5341.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2/7/2023

Updated: 10/24/2023

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-23518


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libwpewebkit-1.0-3, p-cpe:/a:debian:debian_linux:libwpewebkit-1.0-dev, p-cpe:/a:debian:debian_linux:libwpewebkit-1.0-doc, p-cpe:/a:debian:debian_linux:wpewebkit-driver, cpe:/o:debian:debian_linux:11.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 2/6/2023

Vulnerability Publication Date: 1/24/2023

Reference Information

CVE: CVE-2022-42826, CVE-2023-23517, CVE-2023-23518