[USN-3828-1] WebKitGTK+ vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”VRXfYhCg0ocmdMxRxat9LPahFZ29oSFqu”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–VRXfYhCg0ocmdMxRxat9LPahFZ29oSFqu

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3828-1] WebKitGTK+ vulnerabilities

–5fqDlW18cfXHJIgHPOWpz53hcObKWpcGM

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3828-1
November 27, 2018

webkit2gtk vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in WebKitGTK+.

Software Description:
– webkit2gtk: Web content engine library for GTK+

Details:

A large number of security issues were discovered in the WebKitGTK+ Web a=
nd
JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to w=
eb
browser security, including cross-site scripting attacks, denial of servi=
ce
attacks, and arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libjavascriptcoregtk-4.0-18 2.22.4-0ubuntu0.18.10.1
libwebkit2gtk-4.0-37 2.22.4-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
libjavascriptcoregtk-4.0-18 2.22.4-0ubuntu0.18.04.1
libwebkit2gtk-4.0-37 2.22.4-0ubuntu0.18.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any application=
s
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3828-1
CVE-2018-4345, CVE-2018-4372, CVE-2018-4386

Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.22.4-0ubuntu0.18.10.1=

https://launchpad.net/ubuntu/+source/webkit2gtk/2.22.4-0ubuntu0.18.04.1=

–5fqDlW18cfXHJIgHPOWpz53hcObKWpcGM–

–VRXfYhCg0ocmdMxRxat9LPahFZ29oSFqu

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=+W+4
—–END PGP SIGNATURE—–

–VRXfYhCg0ocmdMxRxat9LPahFZ29oSFqu–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK