CVE-2015-1156
Publication date 8 May 2015
Last updated 24 July 2024
Ubuntu priority
Description
The page-loading implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, does not properly handle the rel attribute in an A element, which allows remote attackers to bypass the Same Origin Policy for a link's target, and spoof the user interface, via a crafted web site.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| qtwebkit-opensource-src | ||
| 16.04 LTS xenial | Ignored no update available | |
| 14.04 LTS trusty | Not in release | |
| qtwebkit-source | ||
| 16.04 LTS xenial | Ignored no update available | |
| 14.04 LTS trusty | Not in release | |
| webkit | ||
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| webkitgtk | ||
| 16.04 LTS xenial | Ignored no update available | |
| 14.04 LTS trusty | Not in release | |
Notes
jdstrand
webkit receives limited support. For details, see https://wiki.ubuntu.com/SecurityTeam/FAQ#webkit webkit in Ubuntu uses the JavaScriptCore (JSC) engine, not V8