CVE-2015-1268
Published: 26 June 2015
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.
Priority
Status
Package | Release | Status |
---|---|---|
chromium-browser Launchpad, Ubuntu, Debian |
precise |
Ignored
|
trusty |
Released
(43.0.2357.130-0ubuntu0.14.04.1.1092)
|
|
upstream |
Released
(43.0.2357.130)
|
|
utopic |
Released
(43.0.2357.130-0ubuntu0.14.10.1.1134)
|
|
vivid |
Released
(43.0.2357.130-0ubuntu0.15.04.1.1174)
|
|
wily |
Released
(43.0.2357.130-0ubuntu1.1188)
|
|
oxide-qt Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Released
(1.7.9-0ubuntu0.14.04.1)
|
|
upstream |
Released
(1.7.9)
|
|
utopic |
Released
(1.7.9-0ubuntu0.14.10.1)
|
|
vivid |
Released
(1.7.9-0ubuntu0.15.04.1)
|
|
wily |
Released
(1.7.9-0ubuntu1)
|
References
- https://src.chromium.org/viewvc/blink?revision=196373&view=revision
- https://code.google.com/p/chromium/issues/detail?id=494640
- http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html
- https://ubuntu.com/security/notices/USN-2652-1
- https://www.cve.org/CVERecord?id=CVE-2015-1268
- NVD
- Launchpad
- Debian