UbuntuUpdates.org

Package "webkit2gtk"

Name: webkit2gtk

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • JavaScript engine library from WebKitGTK - GObject introspection data
  • JavaScript engine library from WebKitGTK - GObject introspection data
  • JavaScript engine library from WebKitGTK - GObject introspection data
  • Web content engine library for GTK - GObject introspection data

Latest version: 2.46.4-0ubuntu0.22.04.1
Release: jammy (22.04)
Level: updates
Repository: main

Links



Other versions of "webkit2gtk" in Jammy

Repository Area Version
base universe 2.36.0-2ubuntu1
base main 2.36.0-2ubuntu1
security main 2.46.4-0ubuntu0.22.04.1
security universe 2.46.4-0ubuntu0.22.04.1
updates universe 2.46.4-0ubuntu0.22.04.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 2.46.4-0ubuntu0.22.04.1 2024-12-09 16:06:49 UTC

  webkit2gtk (2.46.4-0ubuntu0.22.04.1) jammy-security; urgency=medium

  * Update to 2.46.4 to fix security issues.
    - CVE-2024-44308
    - CVE-2024-44309

 -- Marc Deslauriers <email address hidden> Tue, 03 Dec 2024 07:22:22 -0500

Source diff to previous version
CVE-2024-44308 The issue was addressed with improved checks. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 an
CVE-2024-44309 A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Seq

Version: 2.46.3-0ubuntu0.22.04.1 2024-11-18 17:06:51 UTC

  webkit2gtk (2.46.3-0ubuntu0.22.04.1) jammy-security; urgency=medium

  * Update to 2.46.3 to fix security issues.
    - debian/control-common.in: no longer mark -dev packages as Multi-Arch:
      same because they are now different on s390x.
    - debian/patches/update_simde.patch: removed, included in new version.
    - CVE-2024-44244
    - CVE-2024-44296

 -- Marc Deslauriers <email address hidden> Wed, 13 Nov 2024 09:09:02 -0500

Source diff to previous version
CVE-2024-44244 A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 18.1 and iPadOS 18.1, watchOS 11.1, visionOS 2.1,
CVE-2024-44296 The issue was addressed with improved checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, watchOS 11.1,

Version: 2.46.1-0ubuntu0.22.04.3 2024-10-22 18:06:53 UTC

  webkit2gtk (2.46.1-0ubuntu0.22.04.3) jammy-security; urgency=medium

  * Build 2.46.1 for jammy to fix security issues.
    - debian/rules: set USE_OLD_WEBDRIVER_PKG=YES, ENABLE_SOUP2=YES,
      USE_OLD_DOC_PKG=YES, USE_OLD_JSCBIN_PKG=YES.
    - debian/control.*: remove libavif-dev as there are no i386 binaries
      for it in 22.04 and it blocks the i386 build.
    - debian/control.*: remove libjxl-dev as it doesn't exist in 22.04.
    - debian/patches/update_simde.patch: fix FTBFS on arm64 by updating
      simde code.
    - CVE-2024-40866
    - CVE-2024-44187

 -- Marc Deslauriers <email address hidden> Tue, 08 Oct 2024 11:24:41 -0400

Source diff to previous version
CVE-2024-40866 The issue was addressed with improved UI. This issue is fixed in Safari 18, macOS Sequoia 15. Visiting a malicious website may lead to address bar sp
CVE-2024-44187 A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18,

Version: 2.44.3-0ubuntu0.22.04.1 2024-09-09 15:07:10 UTC

  webkit2gtk (2.44.3-0ubuntu0.22.04.1) jammy-security; urgency=medium

  * Update to 2.44.3 to fix security issues.
    - CVE-2024-40776, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782,
      CVE-2024-40789, CVE-2024-4558

 -- Marc Deslauriers <email address hidden> Thu, 05 Sep 2024 09:55:49 -0400

Source diff to previous version
CVE-2024-40776 A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and
CVE-2024-40779 An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPa
CVE-2024-40780 An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPa
CVE-2024-40782 A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and
CVE-2024-40789 An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6
CVE-2024-4558 Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML

Version: 2.44.2-0ubuntu0.22.04.1 2024-05-28 14:07:12 UTC

  webkit2gtk (2.44.2-0ubuntu0.22.04.1) jammy-security; urgency=medium

  * Update to 2.44.2 to fix security issues.
    - debian/patches/fix-ftbfs-i386.patch: removed, no longer needed.
    - CVE-2024-27834

 -- Marc Deslauriers <email address hidden> Tue, 21 May 2024 10:15:17 -0400

CVE-2024-27834 The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.



About   -   Send Feedback to @ubuntu_updates