{"id":"USN-3200-1","summary":"webkit2gtk vulnerabilities","details":"A large number of security issues were discovered in the WebKitGTK+ Web and\nJavaScript engines. If a user were tricked into viewing a malicious\nwebsite, a remote attacker could exploit a variety of issues related to web\nbrowser security, including cross-site scripting attacks, denial of service\nattacks, and arbitrary code execution.\n","modified":"2026-02-10T04:41:05Z","published":"2017-02-16T18:31:27Z","related":["UBUNTU-CVE-2017-2350","UBUNTU-CVE-2017-2354","UBUNTU-CVE-2017-2355","UBUNTU-CVE-2017-2356","UBUNTU-CVE-2017-2362","UBUNTU-CVE-2017-2363","UBUNTU-CVE-2017-2364","UBUNTU-CVE-2017-2365","UBUNTU-CVE-2017-2366","UBUNTU-CVE-2017-2369","UBUNTU-CVE-2017-2371","UBUNTU-CVE-2017-2373"],"upstream":["CVE-2017-2350","CVE-2017-2354","CVE-2017-2355","CVE-2017-2356","CVE-2017-2362","CVE-2017-2363","CVE-2017-2364","CVE-2017-2365","CVE-2017-2366","CVE-2017-2369","CVE-2017-2371","CVE-2017-2373","UBUNTU-CVE-2017-2350","UBUNTU-CVE-2017-2354","UBUNTU-CVE-2017-2355","UBUNTU-CVE-2017-2356","UBUNTU-CVE-2017-2362","UBUNTU-CVE-2017-2363","UBUNTU-CVE-2017-2364","UBUNTU-CVE-2017-2365","UBUNTU-CVE-2017-2366","UBUNTU-CVE-2017-2369","UBUNTU-CVE-2017-2371","UBUNTU-CVE-2017-2373"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3200-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2350"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2354"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2355"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2356"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2362"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2363"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2364"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2365"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2366"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2369"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2371"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2373"}],"affected":[{"package":{"name":"webkit2gtk","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/webkit2gtk@2.14.5-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.14.5-0ubuntu0.16.04.1"}]}],"versions":["2.8.5+dfsg1-3","2.10.3+dfsg1-1","2.10.4+dfsg1-1","2.10.5-1","2.10.6-1","2.10.6-1ubuntu1","2.10.8-1ubuntu1","2.10.9-1ubuntu1","2.12.5-0ubuntu0.16.04.1","2.14.2-0ubuntu0.16.04.1","2.14.3-0ubuntu0.16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"gir1.2-javascriptcoregtk-4.0","binary_version":"2.14.5-0ubuntu0.16.04.1"},{"binary_name":"gir1.2-webkit2-4.0","binary_version":"2.14.5-0ubuntu0.16.04.1"},{"binary_name":"libjavascriptcoregtk-4.0-18","binary_version":"2.14.5-0ubuntu0.16.04.1"},{"binary_name":"libjavascriptcoregtk-4.0-bin","binary_version":"2.14.5-0ubuntu0.16.04.1"},{"binary_name":"libjavascriptcoregtk-4.0-dev","binary_version":"2.14.5-0ubuntu0.16.04.1"},{"binary_name":"libwebkit2gtk-4.0-37","binary_version":"2.14.5-0ubuntu0.16.04.1"},{"binary_name":"libwebkit2gtk-4.0-37-gtk2","binary_version":"2.14.5-0ubuntu0.16.04.1"},{"binary_name":"libwebkit2gtk-4.0-dev","binary_version":"2.14.5-0ubuntu0.16.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3200-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2350"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2354"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2355"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2356"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2362"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2363"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2364"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2365"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2366"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2369"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2371"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2373"}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}