CVE-2017-1000121 PUBLISHED

The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.

EPSS 0.65% · 70.6th percentile

Risk Scores

EPSS Score
0.65%
70.6th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSqtwebkit-opensource-src0, 5.212.0~alpha2-7ubuntu1, 5.212.0~alpha2-7build2
Ubuntu:22.04:LTSqtwebkit-opensource-src5.212.0~alpha4-12, 5.212.0~alpha4-15ubuntu1, 5.212.0~alpha4-14ubuntu2
Ubuntu:16.04:LTSqtwebkit-opensource-src0, 5.5.1+dfsg-2ubuntu1, 5.4.2+dfsg-1ubuntu2.1
Ubuntu:16.04:LTSqtwebkit-source0, 2.3.2-0ubuntu11, 2.3.2-0ubuntu10
Ubuntu:18.04:LTSqtwebkit-source2.3.2-0ubuntu13, 0
Ubuntu:16.04:LTSwebkitgtk2.4.11-0ubuntu0.1, 2.4.10-0ubuntu1, 2.4.9-2ubuntu2
Ubuntu:24.04:LTSqtwebkit-opensource-src5.212.0~alpha4-36, 0, 5.212.0~alpha4-33
Ubuntu:18.04:LTSwebkitgtk2.4.11-3, 0, 2.4.11-3ubuntu3
Ubuntu:20.04:LTSqtwebkit-opensource-src5.212.0~alpha4-1, 5.212.0~alpha4-1ubuntu1, 5.212.0~alpha4-1ubuntu2

Timeline

References

Open in Interactive Console →