This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7788919897837300492== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="fsJ0MUt3gP1pWTkxDq0HxBJ5PVcHpgifK"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --fsJ0MUt3gP1pWTkxDq0HxBJ5PVcHpgifK Content-Type: multipart/mixed; boundary="8KuqQ9ksPXs9JeMoNlE1GAGQP9xNiiqPC" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <60278626-09aa-64bb-bebe-79855e41b0e0@canonical.com> Subject: [USN-3079-1] WebKitGTK+ vulnerabilities
--8KuqQ9ksPXs9JeMoNlE1GAGQP9xNiiqPC Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3079-1 September 14, 2016
webkit2gtk vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in WebKitGTK+.
Software Description: - webkit2gtk: JavaScript engine library from WebKitGTK+ - GObject introspection
Details:
A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: libjavascriptcoregtk-4.0-18 2.12.5-0ubuntu0.16.04.1 libwebkit2gtk-4.0-37 2.12.5-0ubuntu0.16.04.1
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK+, such as Epiphany, to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-3079-1 CVE-2016-1854, CVE-2016-1856, CVE-2016-1857, CVE-2016-1858, CVE-2016-1859, CVE-2016-4583, CVE-2016-4585, CVE-2016-4586, CVE-2016-4588, CVE-2016-4589, CVE-2016-4590, CVE-2016-4591, CVE-2016-4622, CVE-2016-4623, CVE-2016-4624, CVE-2016-4651
Package Information: https://launchpad.net/ubuntu/+source/webkit2gtk/2.12.5-0ubuntu0.16.04.1
--8KuqQ9ksPXs9JeMoNlE1GAGQP9xNiiqPC--
--fsJ0MUt3gP1pWTkxDq0HxBJ5PVcHpgifK Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJX2V0SAAoJEGVp2FWnRL6TwB4P/1n519HedsXyWXRFCfCclqMY Wju6Zp9iqylk40DBXiedWsOPisKJf1BsPLqitoCUUnYPLwIiVaMd6ymx2KhLgAsU WI5TynPCWXCB6KvpVcKgY1x6IsZVRwxLVgv9fW16K9RbEpqW4NpJbc8dwNQZfwiz /J+bB5FjBDay1Q5pzKOfw2424z0FGn6hwmIlw2m4rCfpL7ah2qcN9j4NnufGATJR cnj8w/iHedYkzLXzvCxhs2lQBKxa91oSO5jNsQVHyvzydsZm6TocBu60YoufECWI NCByTnvK1IXOf1pwxPkDKvx2B3VgKAs19H3uiUXbVL10vOFkG09rCTIpvGyfphU0 FXTxUjAdbPijnzNom4KB+adS6LkBB5mJslQXz88x+fXA+WL5sN67OPeSXYNODk3g XIiBPbDlD1DgF5MD8WhSHpGNgHJ9CDLXkyNXmPxV5c9nWSYHOrKzbA7UOEHVc6En nsSsri8Fv4o/eyx5o/mIn3rJN4R5kmCeXIVQHw05IRLuBdgZgnJrpCAKhfBN/8AW qIthQf4zsIAOUiLd59HcPxrSP2Kj6HXlU236PnMbb/c46VzugqYouAIIugnl74uS AZmUSyKp27V91Bp2wpXdLZt/+UofWE98Zh3rZESebWUuef5i90gK3bqRWLPLMqGx p/fLSTx9nSVZTccHK0Pj =i6bI -----END PGP SIGNATURE-----
--fsJ0MUt3gP1pWTkxDq0HxBJ5PVcHpgifK--
--===============7788919897837300492== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============7788919897837300492==--
|