First published: Mon Apr 30 2018(Updated: )
A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libjavascriptcoregtk-4.0-18 | <2.20.1-0ubuntu0.17.10.1 | 2.20.1-0ubuntu0.17.10.1 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/libwebkit2gtk-4.0-37 | <2.20.1-0ubuntu0.17.10.1 | 2.20.1-0ubuntu0.17.10.1 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/libjavascriptcoregtk-4.0-18 | <2.20.1-0ubuntu0.16.04.1 | 2.20.1-0ubuntu0.16.04.1 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/libwebkit2gtk-4.0-37 | <2.20.1-0ubuntu0.16.04.1 | 2.20.1-0ubuntu0.16.04.1 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-3635-1 is high.
A remote attacker can exploit the vulnerabilities in WebKitGTK+ by tricking a user into viewing a malicious website.
The security issues related to web browser security in WebKitGTK+ include cross-site scripting attacks and denial of service vulnerabilities.
The recommended remedy for the libjavascriptcoregtk-4.0-18 vulnerability in Ubuntu 17.10 is version 2.20.1-0ubuntu0.17.10.1.
You can find more information about the vulnerabilities in WebKitGTK+ on the Ubuntu security website.