Ubuntu 5024-1: WebKitGTK vulnerabilities

Advisories

==========================================================================
Ubuntu Security Notice USN-5024-1
July 28, 2021

webkit2gtk vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in WebKitGTK.

Software Description:
- webkit2gtk: Web content engine library for GTK+

Details:

A large number of security issues were discovered in the WebKitGTK Web and
JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to web
browser security, including cross-site scripting attacks, denial of service
attacks, and arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 21.04:
  libjavascriptcoregtk-4.0-18     2.32.3-0ubuntu0.21.04.1
  libwebkit2gtk-4.0-37            2.32.3-0ubuntu0.21.04.1

Ubuntu 20.04 LTS:
  libjavascriptcoregtk-4.0-18     2.32.3-0ubuntu0.20.04.1
  libwebkit2gtk-4.0-37            2.32.3-0ubuntu0.20.04.1

Ubuntu 18.04 LTS:
  libjavascriptcoregtk-4.0-18     2.32.3-0ubuntu0.18.04.1
  libwebkit2gtk-4.0-37            2.32.3-0ubuntu0.18.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK, such as Epiphany, to make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5024-1
  CVE-2021-21775, CVE-2021-21779, CVE-2021-30663, CVE-2021-30665,
  CVE-2021-30689, CVE-2021-30720, CVE-2021-30734, CVE-2021-30744,
  CVE-2021-30749, CVE-2021-30758, CVE-2021-30795, CVE-2021-30797,
  CVE-2021-30799

Package Information:
  https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.3-0ubuntu0.21.04.1
  https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.3-0ubuntu0.20.04.1
  https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.3-0ubuntu0.18.04.1

Ubuntu 5024-1: WebKitGTK vulnerabilities

July 28, 2021

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.04 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in WebKitGTK. Software Description: - webkit2gtk: Web content engine library for GTK+ Details: A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04: libjavascriptcoregtk-4.0-18 2.32.3-0ubuntu0.21.04.1 libwebkit2gtk-4.0-37 2.32.3-0ubuntu0.21.04.1 Ubuntu 20.04 LTS: libjavascriptcoregtk-4.0-18 2.32.3-0ubuntu0.20.04.1 libwebkit2gtk-4.0-37 2.32.3-0ubuntu0.20.04.1 Ubuntu 18.04 LTS: libjavascriptcoregtk-4.0-18 2.32.3-0ubuntu0.18.04.1 libwebkit2gtk-4.0-37 2.32.3-0ubuntu0.18.04.1 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK, such as Epiphany, to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5024-1

CVE-2021-21775, CVE-2021-21779, CVE-2021-30663, CVE-2021-30665,

CVE-2021-30689, CVE-2021-30720, CVE-2021-30734, CVE-2021-30744,

CVE-2021-30749, CVE-2021-30758, CVE-2021-30795, CVE-2021-30797,

CVE-2021-30799

Severity
Ubuntu Security Notice USN-5024-1

Package Information

https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.3-0ubuntu0.21.04.1 https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.3-0ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.3-0ubuntu0.18.04.1

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.