CVE-2016-2845
Published: 5 March 2016
The Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 49.0.2623.75, does not ignore a URL's path component in the case of a ServiceWorker fetch, which allows remote attackers to obtain sensitive information about visited web pages by reading CSP violation reports, related to FrameFetchContext.cpp and ResourceFetcher.cpp.
Priority
CVSS 3 base score: 5.3
Status
Package | Release | Status |
---|---|---|
chromium-browser Launchpad, Ubuntu, Debian |
upstream |
Released
(49.0.2623.75)
|
precise |
Ignored
|
|
trusty |
Does not exist
(trusty was released [49.0.2623.87-0ubuntu0.14.04.1.1112])
|
|
wily |
Released
(49.0.2623.87-0ubuntu0.15.10.1.1222)
|
|
oxide-qt Launchpad, Ubuntu, Debian |
upstream |
Released
(1.13.6)
|
precise |
Does not exist
|
|
trusty |
Does not exist
(trusty was released [1.13.6-0ubuntu0.14.04.1])
|
|
wily |
Released
(1.13.6-0ubuntu0.15.10.1)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845
- https://codereview.chromium.org/1454003003/
- https://code.google.com/p/chromium/issues/detail?id=591402
- https://bugs.chromium.org/p/chromium/issues/detail?id=542060
- http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- https://ubuntu.com/security/notices/USN-2920-1
- NVD
- Launchpad
- Debian