First published: Tue May 08 2018(Updated: )
Ivan Fratric discovered that WebKitGTK+ incorrectly handled certain web content. If a user were tricked into viewing a malicious website, a remote attacker could possibly exploit this to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libjavascriptcoregtk-4.0-18 | <2.20.2-0ubuntu0.18.04.1 | 2.20.2-0ubuntu0.18.04.1 |
=18.04 | ||
All of | ||
ubuntu/libwebkit2gtk-4.0-37 | <2.20.2-0ubuntu0.18.04.1 | 2.20.2-0ubuntu0.18.04.1 |
=18.04 | ||
All of | ||
ubuntu/libjavascriptcoregtk-4.0-18 | <2.20.2-0ubuntu0.17.10.1 | 2.20.2-0ubuntu0.17.10.1 |
=17.10 | ||
All of | ||
ubuntu/libwebkit2gtk-4.0-37 | <2.20.2-0ubuntu0.17.10.1 | 2.20.2-0ubuntu0.17.10.1 |
=17.10 | ||
All of | ||
ubuntu/libjavascriptcoregtk-4.0-18 | <2.20.2-0ubuntu0.16.04.1 | 2.20.2-0ubuntu0.16.04.1 |
=16.04 | ||
All of | ||
ubuntu/libwebkit2gtk-4.0-37 | <2.20.2-0ubuntu0.16.04.1 | 2.20.2-0ubuntu0.16.04.1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this WebKitGTK+ vulnerability is USN-3640-1.
The severity of the WebKitGTK+ vulnerability is not specified.
The WebKitGTK+ vulnerability occurs due to incorrect handling of certain web content.
A remote attacker could possibly exploit the WebKitGTK+ vulnerability to execute arbitrary code.
To fix the WebKitGTK+ vulnerability, update the affected software packages to the specified versions.