The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libwebkit2gtk-4.0-37-gtk2-dbgsym": "2.16.6-0ubuntu0.16.04.1", "gir1.2-webkit2-4.0": "2.16.6-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-dev": "2.16.6-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-18-dbgsym": "2.16.6-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-dev": "2.16.6-0ubuntu0.16.04.1", "gir1.2-javascriptcoregtk-4.0": "2.16.6-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-37-gtk2": "2.16.6-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-18": "2.16.6-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-bin-dbgsym": "2.16.6-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-doc": "2.16.6-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-37": "2.16.6-0ubuntu0.16.04.1", "libwebkit2gtk-4.0-37-dbgsym": "2.16.6-0ubuntu0.16.04.1", "libjavascriptcoregtk-4.0-bin": "2.16.6-0ubuntu0.16.04.1" } ] }