This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============9070854992384689990== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="kVxfQawosMhLaQvwKf3ixmtsJU3ntlULk"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --kVxfQawosMhLaQvwKf3ixmtsJU3ntlULk Content-Type: multipart/mixed; boundary="kas7RGc5XFESM4OWHV85wvpuKiBTwIg7S" From: Marc Deslauriers <marc.deslauriers@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <915e7142-8684-d20c-f267-79d77d009c4b@canonical.com> Subject: [USN-3191-1] WebKitGTK+ vulnerabilities
--kas7RGc5XFESM4OWHV85wvpuKiBTwIg7S Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3191-1 February 06, 2017
webkit2gtk vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10 - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in WebKitGTK+.
Software Description: - webkit2gtk: Web content engine library for GTK+
Details:
A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10: libjavascriptcoregtk-4.0-18 2.14.3-0ubuntu0.16.10.1 libwebkit2gtk-4.0-37 2.14.3-0ubuntu0.16.10.1
Ubuntu 16.04 LTS: libjavascriptcoregtk-4.0-18 2.14.3-0ubuntu0.16.04.1 libwebkit2gtk-4.0-37 2.14.3-0ubuntu0.16.04.1
This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK+, such as Epiphany, to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-3191-1 CVE-2016-7586, CVE-2016-7589, CVE-2016-7592, CVE-2016-7599, CVE-2016-7623, CVE-2016-7632, CVE-2016-7635, CVE-2016-7639, CVE-2016-7641, CVE-2016-7645, CVE-2016-7652, CVE-2016-7654, CVE-2016-7656
Package Information: https://launchpad.net/ubuntu/+source/webkit2gtk/2.14.3-0ubuntu0.16.10.1 https://launchpad.net/ubuntu/+source/webkit2gtk/2.14.3-0ubuntu0.16.04.1
--kas7RGc5XFESM4OWHV85wvpuKiBTwIg7S--
--kVxfQawosMhLaQvwKf3ixmtsJU3ntlULk Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJYmM80AAoJEGVp2FWnRL6T2aIQALmWWtuwXUmkpjxoKF9PkXUP uVpqfNTK6kg0dxCVhvaehKnv9BG86mrCkYqlKD4QQNuxPO3HIMWDW6LaXlYnax6M Td8W+YLB7wjn6CSlhQEC2xqRd/CfWCpnjDT6Yg6aOt5inAZQiDI3+1xYrI7/hS0D yOM9a2zc21X0/+DVf6nvxanSau/pqiaxsdfPf/DjldfguL2DoQJpHRMhChcYjZxI IiuYxdz0etq5XZ13qGT+CeTj8WgTMGHSp/v2dMbN4GnF01DBye7bJq5rusmg8oGQ dSXC0K+de0N7Lym+WqSjfrPUqFcsFgqYueE3wwc0c/1QOiIK58PSaOp9Dq5dX8AT bb6DBTEAVzg10M9BVIumMloKhlZuhWA/fjDHNnS+F2ei7g4mtGClSEUWdSot052z o5IchwDB5ADA3nywMrp2BnFEs+lZidGsWeSTvGs8BuO91JO9c6uZlNv2PPpGLyip MNJ2wyFrT0KFlLTtYhG0TIWwhz/RuveVjy9TFTuXYERTAuHJairvuW67vDm6qob1 liJNRgoDd/sTOeHA+Ga26nU1Kyb8ro6lKtToeI6y9b2iexvF29QhFAgM/0PcSTVV HNZ7AyWe3pcpDmvSMhpodG/u7BxZQbP+D8ENYfFRGVonurYnkLDejUVj4jQ5Ou4z XsnFpyTxzDTyb0dilF78 =IOxH -----END PGP SIGNATURE-----
--kVxfQawosMhLaQvwKf3ixmtsJU3ntlULk--
--===============9070854992384689990== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============9070854992384689990==--
|