CVE-2015-3658
Publication date 2 July 2015
Last updated 24 July 2024
Ubuntu priority
The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an Origin header, which makes it easier for remote attackers to bypass CSRF protection mechanisms via a crafted web site.
Status
Package | Ubuntu Release | Status |
---|---|---|
qtwebkit-opensource-src | ||
16.04 LTS xenial | Ignored no update available | |
14.04 LTS trusty | Not in release | |
qtwebkit-source | ||
16.04 LTS xenial | Ignored no update available | |
14.04 LTS trusty | Not in release | |
webkit | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
webkitgtk | ||
16.04 LTS xenial |
Fixed 2.4.10-0ubuntu1
|
|
14.04 LTS trusty |
Fixed 2.4.10-0ubuntu0.14.04.1
|
|
Notes
jdstrand
webkit receives limited support. For details, see https://wiki.myasnchisdf.eu.org/SecurityTeam/FAQ#webkit webkit in Ubuntu uses the JavaScriptCore (JSC) engine, not V8
References
Related Ubuntu Security Notices (USN)
- USN-2937-1
- WebKitGTK+ vulnerabilities
- 21 March 2016