{"id":"USN-3191-1","summary":"webkit2gtk vulnerabilities","details":"A large number of security issues were discovered in the WebKitGTK+ Web and\nJavaScript engines. If a user were tricked into viewing a malicious\nwebsite, a remote attacker could exploit a variety of issues related to web\nbrowser security, including cross-site scripting attacks, denial of service\nattacks, and arbitrary code execution.\n","modified":"2026-02-10T04:41:05Z","published":"2017-02-06T18:33:18Z","related":["UBUNTU-CVE-2016-7586","UBUNTU-CVE-2016-7589","UBUNTU-CVE-2016-7592","UBUNTU-CVE-2016-7599","UBUNTU-CVE-2016-7623","UBUNTU-CVE-2016-7632","UBUNTU-CVE-2016-7635","UBUNTU-CVE-2016-7639","UBUNTU-CVE-2016-7641","UBUNTU-CVE-2016-7645","UBUNTU-CVE-2016-7652","UBUNTU-CVE-2016-7654","UBUNTU-CVE-2016-7656"],"upstream":["CVE-2016-7586","CVE-2016-7589","CVE-2016-7592","CVE-2016-7599","CVE-2016-7623","CVE-2016-7632","CVE-2016-7635","CVE-2016-7639","CVE-2016-7641","CVE-2016-7645","CVE-2016-7652","CVE-2016-7654","CVE-2016-7656","UBUNTU-CVE-2016-7586","UBUNTU-CVE-2016-7589","UBUNTU-CVE-2016-7592","UBUNTU-CVE-2016-7599","UBUNTU-CVE-2016-7623","UBUNTU-CVE-2016-7632","UBUNTU-CVE-2016-7635","UBUNTU-CVE-2016-7639","UBUNTU-CVE-2016-7641","UBUNTU-CVE-2016-7645","UBUNTU-CVE-2016-7652","UBUNTU-CVE-2016-7654","UBUNTU-CVE-2016-7656"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3191-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7586"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7589"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7592"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7599"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7623"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7632"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7635"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7639"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7641"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7645"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7652"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7654"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7656"}],"affected":[{"package":{"name":"webkit2gtk","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/webkit2gtk@2.14.3-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.14.3-0ubuntu0.16.04.1"}]}],"versions":["2.8.5+dfsg1-3","2.10.3+dfsg1-1","2.10.4+dfsg1-1","2.10.5-1","2.10.6-1","2.10.6-1ubuntu1","2.10.8-1ubuntu1","2.10.9-1ubuntu1","2.12.5-0ubuntu0.16.04.1","2.14.2-0ubuntu0.16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.14.3-0ubuntu0.16.04.1","binary_name":"gir1.2-javascriptcoregtk-4.0"},{"binary_version":"2.14.3-0ubuntu0.16.04.1","binary_name":"gir1.2-webkit2-4.0"},{"binary_version":"2.14.3-0ubuntu0.16.04.1","binary_name":"libjavascriptcoregtk-4.0-18"},{"binary_version":"2.14.3-0ubuntu0.16.04.1","binary_name":"libjavascriptcoregtk-4.0-bin"},{"binary_version":"2.14.3-0ubuntu0.16.04.1","binary_name":"libjavascriptcoregtk-4.0-dev"},{"binary_version":"2.14.3-0ubuntu0.16.04.1","binary_name":"libwebkit2gtk-4.0-37"},{"binary_version":"2.14.3-0ubuntu0.16.04.1","binary_name":"libwebkit2gtk-4.0-37-gtk2"},{"binary_version":"2.14.3-0ubuntu0.16.04.1","binary_name":"libwebkit2gtk-4.0-dev"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7586"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7589"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7592"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7599"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7623"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7632"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7635"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7639"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7641"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7645"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7652"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7654"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-7656"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3191-1.json"}}],"schema_version":"1.7.3"}