Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in WebKitGTK+
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in WebKitGTK+
ID: USN-3635-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 17.10
Datum: Mo, 30. April 2018, 22:12
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4119
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4133
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4127
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4114
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4162
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4129
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4101
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4120
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4161
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4165
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4122
Applikationen: WebKitGTK+

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6994093236670468783==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="smzjnuT31ARjTNQlERw3eOVle7slVxyah"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--smzjnuT31ARjTNQlERw3eOVle7slVxyah
Content-Type: multipart/mixed;
boundary="Irh8hwajjC7ieW63rEMjRtKM91KMl4QbS";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <301227e2-4b8e-866f-1f97-a01c2d4120ff@canonical.com>
Subject: [USN-3635-1] WebKitGTK+ vulnerabilities

--Irh8hwajjC7ieW63rEMjRtKM91KMl4QbS
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3635-1
April 30, 2018

webkit2gtk vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.10
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in WebKitGTK+.

Software Description:
- webkit2gtk: Web content engine library for GTK+

Details:

A large number of security issues were discovered in the WebKitGTK+ Web and
JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to web
browser security, including cross-site scripting attacks, denial of service
attacks, and arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
libjavascriptcoregtk-4.0-18 2.20.1-0ubuntu0.17.10.1
libwebkit2gtk-4.0-37 2.20.1-0ubuntu0.17.10.1

Ubuntu 16.04 LTS:
libjavascriptcoregtk-4.0-18 2.20.1-0ubuntu0.16.04.1
libwebkit2gtk-4.0-37 2.20.1-0ubuntu0.16.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3635-1
CVE-2018-4101, CVE-2018-4113, CVE-2018-4114, CVE-2018-4117,
CVE-2018-4118, CVE-2018-4119, CVE-2018-4120, CVE-2018-4122,
CVE-2018-4125, CVE-2018-4127, CVE-2018-4128, CVE-2018-4129,
CVE-2018-4133, CVE-2018-4146, CVE-2018-4161, CVE-2018-4162,
CVE-2018-4163, CVE-2018-4165

Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.20.1-0ubuntu0.17.10.1
https://launchpad.net/ubuntu/+source/webkit2gtk/2.20.1-0ubuntu0.16.04.1


--Irh8hwajjC7ieW63rEMjRtKM91KMl4QbS--

--smzjnuT31ARjTNQlERw3eOVle7slVxyah
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=EHMv
-----END PGP SIGNATURE-----

--smzjnuT31ARjTNQlERw3eOVle7slVxyah--


--===============6994093236670468783==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============6994093236670468783==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung