CVE-2015-1267
Published: 26 June 2015
Blink, as used in Google Chrome before 43.0.2357.130, does not properly restrict the creation context during creation of a DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that uses a Blink public API, related to WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, and WebDOMFileSystem.cpp.
Priority
Status
Package | Release | Status |
---|---|---|
chromium-browser Launchpad, Ubuntu, Debian |
precise |
Ignored
|
trusty |
Released
(43.0.2357.130-0ubuntu0.14.04.1.1092)
|
|
upstream |
Released
(43.0.2357.130)
|
|
utopic |
Released
(43.0.2357.130-0ubuntu0.14.10.1.1134)
|
|
vivid |
Released
(43.0.2357.130-0ubuntu0.15.04.1.1174)
|
|
wily |
Released
(43.0.2357.130-0ubuntu1.1188)
|
|
oxide-qt Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Released
(1.7.9-0ubuntu0.14.04.1)
|
|
upstream |
Released
(1.7.9)
|
|
utopic |
Released
(1.7.9-0ubuntu0.14.10.1)
|
|
vivid |
Released
(1.7.9-0ubuntu0.15.04.1)
|
|
wily |
Released
(1.7.9-0ubuntu1)
|
References
- https://src.chromium.org/viewvc/blink?revision=196755&view=revision
- https://codereview.chromium.org/1174343003/
- https://code.google.com/p/chromium/issues/detail?id=497507
- http://googlechromereleases.blogspot.com/2015/06/chrome-stable-update.html
- https://ubuntu.com/security/notices/USN-2652-1
- https://www.cve.org/CVERecord?id=CVE-2015-1267
- NVD
- Launchpad
- Debian