{"id":"USN-3376-1","summary":"webkit2gtk vulnerabilities","details":"A large number of security issues were discovered in the WebKitGTK+ Web and\nJavaScript engines. If a user were tricked into viewing a malicious\nwebsite, a remote attacker could exploit a variety of issues related to web\nbrowser security, including cross-site scripting attacks, denial of service\nattacks, and arbitrary code execution.\n","modified":"2026-04-22T09:38:19.442057Z","published":"2017-08-02T12:40:36Z","related":["UBUNTU-CVE-2017-2538","UBUNTU-CVE-2017-7018","UBUNTU-CVE-2017-7030","UBUNTU-CVE-2017-7034","UBUNTU-CVE-2017-7037","UBUNTU-CVE-2017-7039","UBUNTU-CVE-2017-7046","UBUNTU-CVE-2017-7048","UBUNTU-CVE-2017-7052","UBUNTU-CVE-2017-7055","UBUNTU-CVE-2017-7056","UBUNTU-CVE-2017-7061","UBUNTU-CVE-2017-7064"],"upstream":["CVE-2017-2538","CVE-2017-7018","CVE-2017-7030","CVE-2017-7034","CVE-2017-7037","CVE-2017-7039","CVE-2017-7046","CVE-2017-7048","CVE-2017-7052","CVE-2017-7055","CVE-2017-7056","CVE-2017-7061","CVE-2017-7064","UBUNTU-CVE-2017-2538","UBUNTU-CVE-2017-7018","UBUNTU-CVE-2017-7030","UBUNTU-CVE-2017-7034","UBUNTU-CVE-2017-7037","UBUNTU-CVE-2017-7039","UBUNTU-CVE-2017-7046","UBUNTU-CVE-2017-7048","UBUNTU-CVE-2017-7052","UBUNTU-CVE-2017-7055","UBUNTU-CVE-2017-7056","UBUNTU-CVE-2017-7061","UBUNTU-CVE-2017-7064"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3376-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-2538"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7018"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7030"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7034"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7037"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7039"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7046"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7048"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7052"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7055"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7056"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7061"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7064"}],"affected":[{"package":{"name":"webkit2gtk","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/webkit2gtk@2.16.6-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.16.6-0ubuntu0.16.04.1"}]}],"versions":["2.8.5+dfsg1-3","2.10.3+dfsg1-1","2.10.4+dfsg1-1","2.10.5-1","2.10.6-1","2.10.6-1ubuntu1","2.10.8-1ubuntu1","2.10.9-1ubuntu1","2.12.5-0ubuntu0.16.04.1","2.14.2-0ubuntu0.16.04.1","2.14.3-0ubuntu0.16.04.1","2.14.5-0ubuntu0.16.04.1","2.16.1-0ubuntu0.16.04.1","2.16.1-0ubuntu0.16.04.2","2.16.2-0ubuntu0.16.04.1","2.16.3-0ubuntu0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.16.6-0ubuntu0.16.04.1","binary_name":"gir1.2-javascriptcoregtk-4.0"},{"binary_version":"2.16.6-0ubuntu0.16.04.1","binary_name":"gir1.2-webkit2-4.0"},{"binary_version":"2.16.6-0ubuntu0.16.04.1","binary_name":"libjavascriptcoregtk-4.0-18"},{"binary_version":"2.16.6-0ubuntu0.16.04.1","binary_name":"libjavascriptcoregtk-4.0-bin"},{"binary_version":"2.16.6-0ubuntu0.16.04.1","binary_name":"libwebkit2gtk-4.0-37"},{"binary_version":"2.16.6-0ubuntu0.16.04.1","binary_name":"libwebkit2gtk-4.0-37-gtk2"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-2538"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7018"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7030"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7034"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7037"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7039"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7046"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7048"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7052"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7055"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7056"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7061"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7064"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3376-1.json"}}],"schema_version":"1.7.5"}