[USN-3854-1] WebKitGTK+ vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”LT7cKf5s8IZUSjFLYzM8YhGxsSAFwYNnU”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–LT7cKf5s8IZUSjFLYzM8YhGxsSAFwYNnU

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3854-1] WebKitGTK+ vulnerabilities

–lLGscK9QjkSlENhmZ4qvuv9Udb44Xuv4l

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3854-1
January 10, 2019

webkit2gtk vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in WebKitGTK+.

Software Description:
– webkit2gtk: Web content engine library for GTK+

Details:

A large number of security issues were discovered in the WebKitGTK+ Web a=
nd
JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to w=
eb
browser security, including cross-site scripting attacks, denial of servi=
ce
attacks, and arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libjavascriptcoregtk-4.0-18 2.22.5-0ubuntu0.18.10.1
libwebkit2gtk-4.0-37 2.22.5-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
libjavascriptcoregtk-4.0-18 2.22.5-0ubuntu0.18.04.1
libwebkit2gtk-4.0-37 2.22.5-0ubuntu0.18.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any application=
s
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3854-1
CVE-2018-4437

Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.22.5-0ubuntu0.18.10.1=

https://launchpad.net/ubuntu/+source/webkit2gtk/2.22.5-0ubuntu0.18.04.1=

–lLGscK9QjkSlENhmZ4qvuv9Udb44Xuv4l–

–LT7cKf5s8IZUSjFLYzM8YhGxsSAFwYNnU

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=U726
—–END PGP SIGNATURE—–

–LT7cKf5s8IZUSjFLYzM8YhGxsSAFwYNnU–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK