CVE-2015-1248
Published: 19 April 2015
The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.
Priority
Status
Package | Release | Status |
---|---|---|
chromium-browser Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Ignored
|
|
trusty |
Released
(43.0.2357.81-0ubuntu0.14.04.1.1089)
|
|
upstream |
Released
(42.0.2311.90)
|
|
utopic |
Released
(43.0.2357.81-0ubuntu0.14.10.1.1131)
|
|
vivid |
Released
(43.0.2357.81-0ubuntu0.15.04.1.1170)
|
|
wily |
Released
(43.0.2357.81-0ubuntu1.1179)
|
|
oxide-qt Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
trusty |
Does not exist
(trusty was not-affected)
|
|
upstream |
Not vulnerable
|
|
utopic |
Not vulnerable
|
|
vivid |
Not vulnerable
|
|
wily |
Not vulnerable
|