{"id":"USN-3530-1","summary":"webkit2gtk vulnerabilities","details":"It was discovered that speculative execution performed by modern CPUs\ncould leak information through a timing side-channel attack, and that\nthis could be exploited in web browser JavaScript engines. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to obtain sensitive information from other\ndomains, bypassing same-origin restrictions. (CVE-2017-5753, CVE-2017-5715)\n","modified":"2026-02-10T04:41:16Z","published":"2018-01-11T13:59:55Z","related":["UBUNTU-CVE-2017-5715","UBUNTU-CVE-2017-5753"],"upstream":["CVE-2017-5715","CVE-2017-5753","UBUNTU-CVE-2017-5715","UBUNTU-CVE-2017-5753"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3530-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5715"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5753"}],"affected":[{"package":{"name":"webkit2gtk","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/webkit2gtk@2.18.5-0ubuntu0.16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.18.5-0ubuntu0.16.04.1"}]}],"versions":["2.8.5+dfsg1-3","2.10.3+dfsg1-1","2.10.4+dfsg1-1","2.10.5-1","2.10.6-1","2.10.6-1ubuntu1","2.10.8-1ubuntu1","2.10.9-1ubuntu1","2.12.5-0ubuntu0.16.04.1","2.14.2-0ubuntu0.16.04.1","2.14.3-0ubuntu0.16.04.1","2.14.5-0ubuntu0.16.04.1","2.16.1-0ubuntu0.16.04.1","2.16.1-0ubuntu0.16.04.2","2.16.2-0ubuntu0.16.04.1","2.16.3-0ubuntu0.16.04.1","2.16.6-0ubuntu0.16.04.1","2.18.0-0ubuntu0.16.04.2","2.18.3-0ubuntu0.16.04.1","2.18.4-0ubuntu0.16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.18.5-0ubuntu0.16.04.1","binary_name":"gir1.2-javascriptcoregtk-4.0"},{"binary_version":"2.18.5-0ubuntu0.16.04.1","binary_name":"gir1.2-webkit2-4.0"},{"binary_version":"2.18.5-0ubuntu0.16.04.1","binary_name":"libjavascriptcoregtk-4.0-18"},{"binary_version":"2.18.5-0ubuntu0.16.04.1","binary_name":"libjavascriptcoregtk-4.0-bin"},{"binary_version":"2.18.5-0ubuntu0.16.04.1","binary_name":"libjavascriptcoregtk-4.0-dev"},{"binary_version":"2.18.5-0ubuntu0.16.04.1","binary_name":"libwebkit2gtk-4.0-37"},{"binary_version":"2.18.5-0ubuntu0.16.04.1","binary_name":"libwebkit2gtk-4.0-37-gtk2"},{"binary_version":"2.18.5-0ubuntu0.16.04.1","binary_name":"libwebkit2gtk-4.0-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3530-1.json","cves_map":{"cves":[{"id":"CVE-2017-5715","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2017-5753","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}