{"id":"USN-3481-1","summary":"webkit2gtk vulnerabilities","details":"A large number of security issues were discovered in the WebKitGTK+ Web and\nJavaScript engines. If a user were tricked into viewing a malicious\nwebsite, a remote attacker could exploit a variety of issues related to web\nbrowser security, including cross-site scripting attacks, denial of service\nattacks, and arbitrary code execution.\n","modified":"2026-04-22T09:41:09.117377Z","published":"2017-11-16T12:47:17Z","related":["UBUNTU-CVE-2017-13783","UBUNTU-CVE-2017-13784","UBUNTU-CVE-2017-13785","UBUNTU-CVE-2017-13788","UBUNTU-CVE-2017-13791","UBUNTU-CVE-2017-13792","UBUNTU-CVE-2017-13793","UBUNTU-CVE-2017-13794","UBUNTU-CVE-2017-13795","UBUNTU-CVE-2017-13796","UBUNTU-CVE-2017-13798","UBUNTU-CVE-2017-13802","UBUNTU-CVE-2017-13803"],"upstream":["CVE-2017-13783","CVE-2017-13784","CVE-2017-13785","CVE-2017-13788","CVE-2017-13791","CVE-2017-13792","CVE-2017-13793","CVE-2017-13794","CVE-2017-13795","CVE-2017-13796","CVE-2017-13798","CVE-2017-13802","CVE-2017-13803","UBUNTU-CVE-2017-13783","UBUNTU-CVE-2017-13784","UBUNTU-CVE-2017-13785","UBUNTU-CVE-2017-13788","UBUNTU-CVE-2017-13791","UBUNTU-CVE-2017-13792","UBUNTU-CVE-2017-13793","UBUNTU-CVE-2017-13794","UBUNTU-CVE-2017-13795","UBUNTU-CVE-2017-13796","UBUNTU-CVE-2017-13798","UBUNTU-CVE-2017-13802","UBUNTU-CVE-2017-13803"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3481-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13783"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13784"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13785"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13788"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13791"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13792"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13793"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13794"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13795"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13796"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13798"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13802"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-13803"}],"affected":[{"package":{"name":"webkit2gtk","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/webkit2gtk@2.18.3-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.18.3-0ubuntu0.16.04.1"}]}],"versions":["2.8.5+dfsg1-3","2.10.3+dfsg1-1","2.10.4+dfsg1-1","2.10.5-1","2.10.6-1","2.10.6-1ubuntu1","2.10.8-1ubuntu1","2.10.9-1ubuntu1","2.12.5-0ubuntu0.16.04.1","2.14.2-0ubuntu0.16.04.1","2.14.3-0ubuntu0.16.04.1","2.14.5-0ubuntu0.16.04.1","2.16.1-0ubuntu0.16.04.1","2.16.1-0ubuntu0.16.04.2","2.16.2-0ubuntu0.16.04.1","2.16.3-0ubuntu0.16.04.1","2.16.6-0ubuntu0.16.04.1","2.18.0-0ubuntu0.16.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"gir1.2-javascriptcoregtk-4.0","binary_version":"2.18.3-0ubuntu0.16.04.1"},{"binary_name":"gir1.2-webkit2-4.0","binary_version":"2.18.3-0ubuntu0.16.04.1"},{"binary_name":"libjavascriptcoregtk-4.0-18","binary_version":"2.18.3-0ubuntu0.16.04.1"},{"binary_name":"libjavascriptcoregtk-4.0-bin","binary_version":"2.18.3-0ubuntu0.16.04.1"},{"binary_name":"libwebkit2gtk-4.0-37","binary_version":"2.18.3-0ubuntu0.16.04.1"},{"binary_name":"libwebkit2gtk-4.0-37-gtk2","binary_version":"2.18.3-0ubuntu0.16.04.1"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13783"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13784"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13785"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13788"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13791"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13792"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13793"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13794"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13795"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13796"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13798"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13802"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-13803"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3481-1.json"}}],"schema_version":"1.7.5"}