{"id":"USN-3191-1","summary":"webkit2gtk vulnerabilities","details":"A large number of security issues were discovered in the WebKitGTK+ Web and\nJavaScript engines. If a user were tricked into viewing a malicious\nwebsite, a remote attacker could exploit a variety of issues related to web\nbrowser security, including cross-site scripting attacks, denial of service\nattacks, and arbitrary code execution.\n","modified":"2026-04-22T09:32:03.377213Z","published":"2017-02-06T18:33:18Z","related":["UBUNTU-CVE-2016-7586","UBUNTU-CVE-2016-7589","UBUNTU-CVE-2016-7592","UBUNTU-CVE-2016-7599","UBUNTU-CVE-2016-7623","UBUNTU-CVE-2016-7632","UBUNTU-CVE-2016-7635","UBUNTU-CVE-2016-7639","UBUNTU-CVE-2016-7641","UBUNTU-CVE-2016-7645","UBUNTU-CVE-2016-7652","UBUNTU-CVE-2016-7654","UBUNTU-CVE-2016-7656"],"upstream":["CVE-2016-7586","CVE-2016-7589","CVE-2016-7592","CVE-2016-7599","CVE-2016-7623","CVE-2016-7632","CVE-2016-7635","CVE-2016-7639","CVE-2016-7641","CVE-2016-7645","CVE-2016-7652","CVE-2016-7654","CVE-2016-7656","UBUNTU-CVE-2016-7586","UBUNTU-CVE-2016-7589","UBUNTU-CVE-2016-7592","UBUNTU-CVE-2016-7599","UBUNTU-CVE-2016-7623","UBUNTU-CVE-2016-7632","UBUNTU-CVE-2016-7635","UBUNTU-CVE-2016-7639","UBUNTU-CVE-2016-7641","UBUNTU-CVE-2016-7645","UBUNTU-CVE-2016-7652","UBUNTU-CVE-2016-7654","UBUNTU-CVE-2016-7656"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3191-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7586"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7589"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7592"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7599"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7623"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7632"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7635"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7639"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7641"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7645"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7652"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7654"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7656"}],"affected":[{"package":{"name":"webkit2gtk","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/webkit2gtk@2.14.3-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.14.3-0ubuntu0.16.04.1"}]}],"versions":["2.8.5+dfsg1-3","2.10.3+dfsg1-1","2.10.4+dfsg1-1","2.10.5-1","2.10.6-1","2.10.6-1ubuntu1","2.10.8-1ubuntu1","2.10.9-1ubuntu1","2.12.5-0ubuntu0.16.04.1","2.14.2-0ubuntu0.16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"gir1.2-javascriptcoregtk-4.0","binary_version":"2.14.3-0ubuntu0.16.04.1"},{"binary_name":"gir1.2-webkit2-4.0","binary_version":"2.14.3-0ubuntu0.16.04.1"},{"binary_name":"libjavascriptcoregtk-4.0-18","binary_version":"2.14.3-0ubuntu0.16.04.1"},{"binary_name":"libjavascriptcoregtk-4.0-bin","binary_version":"2.14.3-0ubuntu0.16.04.1"},{"binary_name":"libwebkit2gtk-4.0-37","binary_version":"2.14.3-0ubuntu0.16.04.1"},{"binary_name":"libwebkit2gtk-4.0-37-gtk2","binary_version":"2.14.3-0ubuntu0.16.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2016-7586","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7589","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7592","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7599","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7623","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7632","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7635","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7639","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7641","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7645","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7652","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7654","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7656","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3191-1.json"}}],"schema_version":"1.7.5"}