CVE-2015-3752
Publication date 16 August 2015
Last updated 24 July 2024
Ubuntu priority
The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross-origin request or (2) a private-browsing request.
Status
Package | Ubuntu Release | Status |
---|---|---|
qtwebkit-opensource-src | ||
16.04 LTS xenial | Ignored no update available | |
14.04 LTS trusty | Not in release | |
qtwebkit-source | ||
16.04 LTS xenial | Ignored no update available | |
14.04 LTS trusty | Not in release | |
webkit | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
webkitgtk | ||
16.04 LTS xenial |
Fixed 2.4.10-0ubuntu1
|
|
14.04 LTS trusty |
Fixed 2.4.10-0ubuntu0.14.04.1
|
|
Notes
jdstrand
webkit receives limited support. For details, see https://wiki.myasnchisdf.eu.org/SecurityTeam/FAQ#webkit webkit in Ubuntu uses the JavaScriptCore (JSC) engine, not V8
References
Related Ubuntu Security Notices (USN)
- USN-2937-1
- WebKitGTK+ vulnerabilities
- 21 March 2016