Upstream information
Description
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 5 |
Vector | AV:N/AC:L/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
SUSE Security Advisories:
- openSUSE-SU-2015:1146-1
openSUSE-SU-2015:1872-1
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Leap 15.0 |
| Patchnames: openSUSE Leap 15.0 GA chromium-66.0.3359.170-lp150.1.1 |
openSUSE Leap 15.2 |
| Patchnames: openSUSE Leap 15.2 GA chromium-83.0.4103.97-lp152.1.1 |
openSUSE Leap 15.3 |
| Patchnames: openSUSE Leap 15.3 GA chromium-90.0.4430.212-bp153.1.1 |
openSUSE Leap 15.4 |
| Patchnames: openSUSE Leap 15.4 GA chromium-101.0.4951.64-bp154.1.2 |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-10171 openSUSE-Tumbleweed-2024-12948 |
SUSE Timeline for this CVE
CVE page created: Tue Jun 23 07:49:10 2015CVE page last modified: Wed Sep 11 11:17:05 2024