[USN-3889-1] WebKitGTK+ vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”C1dbL9ngY4bNAfzbfsqBaULPES2oHSREB”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–C1dbL9ngY4bNAfzbfsqBaULPES2oHSREB

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3889-1] WebKitGTK+ vulnerabilities

–KXkVIa0b3xaG8d6KzYD5Smu27Mgpzptwt

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3889-1
February 13, 2019

webkit2gtk vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in WebKitGTK+.

Software Description:
– webkit2gtk: Web content engine library for GTK+

Details:

A large number of security issues were discovered in the WebKitGTK+ Web
and JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to w=
eb
browser security, including cross-site scripting attacks, denial of servi=
ce
attacks, and arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
libjavascriptcoregtk-4.0-18 2.22.6-0ubuntu0.18.10.1
libwebkit2gtk-4.0-37 2.22.6-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
libjavascriptcoregtk-4.0-18 2.22.6-0ubuntu0.18.04.1
libwebkit2gtk-4.0-37 2.22.6-0ubuntu0.18.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any application=
s
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3889-1
CVE-2019-6212, CVE-2019-6215

Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.22.6-0ubuntu0.18.10.1=

https://launchpad.net/ubuntu/+source/webkit2gtk/2.22.6-0ubuntu0.18.04.1=

–KXkVIa0b3xaG8d6KzYD5Smu27Mgpzptwt–

–C1dbL9ngY4bNAfzbfsqBaULPES2oHSREB

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=aNaE
—–END PGP SIGNATURE—–

–C1dbL9ngY4bNAfzbfsqBaULPES2oHSREB–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK