Integer Overflow or Wraparound Affecting webkit2gtk package, versions <2.16.3-2
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WEBKIT2GTK-389152
- published 1 Nov 2017
- disclosed 1 Nov 2017
Introduced: 1 Nov 2017
CVE-2017-1000121 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
webkit2gtk
to version 2.16.3-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream webkit2gtk
package and not the webkit2gtk
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.