This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6812340724966409824==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="a65jMrUcEc28hLcaQe3PNfj8WIg6qBElK"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--a65jMrUcEc28hLcaQe3PNfj8WIg6qBElK
Content-Type: multipart/mixed; boundary="mEItETklS4NmgqhBw701JL9Mli0Gg3IPs";
protected-headers="v1"
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: "ubuntu-security-announce@lists.ubuntu.com"
Message-ID: <7591bd19-478c-d649-cf14-187727d4fc97@canonical.com>
Subject: [USN-3376-1] WebKitGTK+ vulnerabilities
--mEItETklS4NmgqhBw701JL9Mli0Gg3IPs
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable
==========================================================================
Ubuntu Security Notice USN-3376-1
August 02, 2017
webkit2gtk vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in WebKitGTK+.
Software Description:
- webkit2gtk: Web content engine library for GTK+
Details:
A large number of security issues were discovered in the WebKitGTK+ Web and
JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to web
browser security, including cross-site scripting attacks, denial of service
attacks, and arbitrary code execution.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libjavascriptcoregtk-4.0-18 2.16.6-0ubuntu0.17.04.1
libwebkit2gtk-4.0-37 2.16.6-0ubuntu0.17.04.1
Ubuntu 16.04 LTS:
libjavascriptcoregtk-4.0-18 2.16.6-0ubuntu0.16.04.1
libwebkit2gtk-4.0-37 2.16.6-0ubuntu0.16.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3376-1
CVE-2017-2538, CVE-2017-7018, CVE-2017-7030, CVE-2017-7034,
CVE-2017-7037, CVE-2017-7039, CVE-2017-7046, CVE-2017-7048,
CVE-2017-7052, CVE-2017-7055, CVE-2017-7056, CVE-2017-7061,
CVE-2017-7064
Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.16.6-0ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/webkit2gtk/2.16.6-0ubuntu0.16.04.1
--mEItETklS4NmgqhBw701JL9Mli0Gg3IPs--
--a65jMrUcEc28hLcaQe3PNfj8WIg6qBElK
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=+bsE
-----END PGP SIGNATURE-----
--a65jMrUcEc28hLcaQe3PNfj8WIg6qBElK--
--===============6812340724966409824==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============6812340724966409824==--
|