Debian Package Tracker
Register | Log in
Subscribe

wpewebkit

Choose email to subscribe with

general
  • source: wpewebkit (main)
  • version: 2.42.0-1
  • maintainer: Debian WebKit Maintainers (archive) (DMD)
  • uploaders: Alberto Garcia [DMD]
  • arch: all
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 2.38.5-1~deb11u1
  • old-sec: 2.38.6-1~deb11u1
  • old-p-u: 2.38.6-1~deb11u1
  • stable: 2.38.6-1
  • testing: 2.40.5-1
  • unstable: 2.42.0-1
versioned links
  • 2.38.5-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.38.6-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.38.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.40.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.42.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libwpewebkit-1.0-doc
  • libwpewebkit-1.1-0
  • libwpewebkit-1.1-dev
  • wpewebkit-driver
action needed
lintian reports 2 errors high
Lintian reports 2 errors about this package. You should make the package lintian clean getting rid of them.
Created: 2023-09-21 Last update: 2023-09-21 02:42
18 security issues in bullseye high

There are 18 open security issues in bullseye.

18 important issues:
  • CVE-2023-28198: A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution.
  • CVE-2023-28204: An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.
  • CVE-2023-32370: A logic issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3. Content Security Policy to block domains with wildcards may fail.
  • CVE-2023-32373: A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
  • CVE-2023-32393: The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing web content may lead to arbitrary code execution.
  • CVE-2023-32435: A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
  • CVE-2023-32439: A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
  • CVE-2023-37450: The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
  • CVE-2023-38133: The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may disclose sensitive information.
  • CVE-2023-38572: The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. A website may be able to bypass Same Origin Policy.
  • CVE-2023-38592: A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38594: The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38595: The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38597: The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, Safari 16.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38599: A logic issue was addressed with improved state management. This issue is fixed in Safari 16.6, watchOS 9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A website may be able to track sensitive user information.
  • CVE-2023-38600: The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38611: The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-40397: The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.5. A remote attacker may be able to cause arbitrary javascript code execution.
Created: 2023-05-25 Last update: 2023-09-21 01:09
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2023-08-18 Last update: 2023-09-23 07:35
debian/patches: 5 patches to forward upstream low

Among the 6 debian patches available in version 2.42.0-1 of the package, we noticed the following issues:

  • 5 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-09-21 06:13
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2023-07-22 Last update: 2023-07-22 14:37
No known security issue in bookworm wishlist

There are 18 open security issues in bookworm.

18 ignored issues:
  • CVE-2023-28198: A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution.
  • CVE-2023-28204: An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.
  • CVE-2023-32370: A logic issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3. Content Security Policy to block domains with wildcards may fail.
  • CVE-2023-32373: A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
  • CVE-2023-32393: The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing web content may lead to arbitrary code execution.
  • CVE-2023-32435: A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
  • CVE-2023-32439: A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
  • CVE-2023-37450: The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
  • CVE-2023-38133: The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may disclose sensitive information.
  • CVE-2023-38572: The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. A website may be able to bypass Same Origin Policy.
  • CVE-2023-38592: A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38594: The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38595: The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38597: The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, Safari 16.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38599: A logic issue was addressed with improved state management. This issue is fixed in Safari 16.6, watchOS 9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A website may be able to track sensitive user information.
  • CVE-2023-38600: The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-38611: The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
  • CVE-2023-40397: The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.5. A remote attacker may be able to cause arbitrary javascript code execution.
Created: 2023-06-10 Last update: 2023-09-21 01:09
testing migrations
  • This package will soon be part of the auto-libavif transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • This package will soon be part of the auto-jpeg-xl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • This package will soon be part of the auto-icu transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status for wpewebkit (2.40.5-1 to 2.42.0-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Too young, only 2 of 5 days old
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/w/wpewebkit.html
    • Not considered
news
[rss feed]
  • [2023-09-20] Accepted wpewebkit 2.42.0-1 (source) into unstable (Alberto Garcia)
  • [2023-08-09] wpewebkit 2.40.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-08-01] Accepted wpewebkit 2.40.5-1 (source) into unstable (Alberto Garcia)
  • [2023-07-25] wpewebkit 2.40.4-1 MIGRATED to testing (Debian testing watch)
  • [2023-07-21] Accepted wpewebkit 2.40.4-1 (source) into unstable (Alberto Garcia)
  • [2023-07-02] wpewebkit 2.40.3-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-29] Accepted wpewebkit 2.40.3-1 (source) into unstable (Alberto Garcia)
  • [2023-06-23] wpewebkit 2.40.2-2 MIGRATED to testing (Debian testing watch)
  • [2023-06-16] Accepted wpewebkit 2.40.2-2 (source) into unstable (Alberto Garcia)
  • [2023-06-04] Accepted wpewebkit 2.40.2-1 (source) into experimental (Alberto Garcia)
  • [2023-05-06] Accepted wpewebkit 2.38.6-1~deb11u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Alberto Garcia)
  • [2023-05-03] Accepted wpewebkit 2.38.6-1~deb11u1 (source) into stable-security (Debian FTP Masters) (signed by: Alberto Garcia)
  • [2023-04-30] wpewebkit 2.38.6-1 MIGRATED to testing (Debian testing watch)
  • [2023-04-25] Accepted wpewebkit 2.38.6-1 (source) into unstable (Alberto Garcia)
  • [2023-04-19] Accepted wpewebkit 2.40.1-1 (source) into experimental (Alberto Garcia)
  • [2023-03-22] Accepted wpewebkit 2.40.0-1 (source) into experimental (Alberto Garcia)
  • [2023-03-14] Accepted wpewebkit 2.39.91-1 (source all i386) into experimental (Debian FTP Masters) (signed by: Alberto Garcia)
  • [2023-02-19] Accepted wpewebkit 2.38.5-1~deb11u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Alberto Garcia)
  • [2023-02-19] wpewebkit 2.38.5-1 MIGRATED to testing (Debian testing watch)
  • [2023-02-16] Accepted wpewebkit 2.38.5-1~deb11u1 (source) into stable-security (Debian FTP Masters) (signed by: Alberto Garcia)
  • [2023-02-15] Accepted wpewebkit 2.38.5-1 (source) into unstable (Alberto Garcia)
  • [2023-02-12] Accepted wpewebkit 2.38.4-1~deb11u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Alberto Garcia)
  • [2023-02-07] wpewebkit 2.38.4-1 MIGRATED to testing (Debian testing watch)
  • [2023-02-06] Accepted wpewebkit 2.38.4-1~deb11u1 (source) into stable-security (Debian FTP Masters) (signed by: Alberto Garcia)
  • [2023-02-02] Accepted wpewebkit 2.38.4-1 (source) into unstable (Alberto Garcia)
  • [2023-01-04] Accepted wpewebkit 2.38.3-1~deb11u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Alberto Garcia)
  • [2022-12-31] Accepted wpewebkit 2.38.3-1~deb11u1 (source) into stable-security (Debian FTP Masters) (signed by: Alberto Garcia)
  • [2022-12-27] wpewebkit 2.38.3-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-24] Accepted wpewebkit 2.38.3-1 (source) into unstable (Alberto Garcia)
  • [2022-11-19] Accepted wpewebkit 2.38.2-1~deb11u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Alberto Garcia)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (2, 0)
  • buildd: logs, checks, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing