-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3471
                  USN-4130-1: WebKitGTK+ vulnerabilities
                             12 September 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           WebKitGTK+
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
                   Denial of Service               -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-8690 CVE-2019-8689 CVE-2019-8688
                   CVE-2019-8687 CVE-2019-8684 CVE-2019-8683
                   CVE-2019-8681 CVE-2019-8680 CVE-2019-8678
                   CVE-2019-8676 CVE-2019-8673 CVE-2019-8669
                   CVE-2019-8666 CVE-2019-8658 CVE-2019-8649
                   CVE-2019-8644  

Reference:         ESB-2019.3451
                   ESB-2019.3357
                   ESB-2019.3294
                   ESB-2019.2762

Original Bulletin: 
   https://usn.ubuntu.com/4130-1/

- --------------------------BEGIN INCLUDED TEXT--------------------

USN-4130-1: WebKitGTK+ vulnerabilities
11 September 2019

webkit2gtk vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:

  o Ubuntu 19.04
  o Ubuntu 18.04 LTS

Summary

Several security issues were fixed in WebKitGTK+.

Software Description

  o webkit2gtk - Web content engine library for GTK+

Details

A large number of security issues were discovered in the WebKitGTK+ Web and
JavaScript engines. If a user were tricked into viewing a malicious website, a
remote attacker could exploit a variety of issues related to web browser
security, including cross-site scripting attacks, denial of service attacks,
and arbitrary code execution.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 19.04
    libjavascriptcoregtk-4.0-18 - 2.24.4-0ubuntu0.19.04.1
    libwebkit2gtk-4.0-37 - 2.24.4-0ubuntu0.19.04.1
Ubuntu 18.04 LTS
    libjavascriptcoregtk-4.0-18 - 2.24.4-0ubuntu0.18.04.1
    libwebkit2gtk-4.0-37 - 2.24.4-0ubuntu0.18.04.1

To update your system, please follow these instructions: https://
wiki.ubuntu.com/Security/Upgrades .

This update uses a new upstream release, which includes additional bug fixes.
After a standard system update you need to restart any applications that use
WebKitGTK+, such as Epiphany, to make all the necessary changes.

References

  o CVE-2019-8644
  o CVE-2019-8649
  o CVE-2019-8658
  o CVE-2019-8666
  o CVE-2019-8669
  o CVE-2019-8673
  o CVE-2019-8676
  o CVE-2019-8678
  o CVE-2019-8680
  o CVE-2019-8681
  o CVE-2019-8683
  o CVE-2019-8684
  o CVE-2019-8687
  o CVE-2019-8688
  o CVE-2019-8689
  o CVE-2019-8690

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=WWF+
-----END PGP SIGNATURE-----