Upstream information
Description
The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
National Vulnerability Database | |
---|---|
Base Score | 4.3 |
Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
SUSE Security Advisories:
- openSUSE-SU-2015:0748-1, published Wed, 22 Apr 2015 11:04:47 +0200 (CEST)
- openSUSE-SU-2015:1887-1, published Mon, 2 Nov 2015 16:41:27 +0100 (CET)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Leap 15.0 |
| Patchnames: openSUSE Leap 15.0 GA chromium-66.0.3359.170-lp150.1.1 |
openSUSE Leap 15.2 |
| Patchnames: openSUSE Leap 15.2 GA chromium-83.0.4103.97-lp152.1.1 |
openSUSE Leap 15.3 |
| Patchnames: openSUSE Leap 15.3 GA chromium-90.0.4430.212-bp153.1.1 |
openSUSE Leap 15.4 |
| Patchnames: openSUSE Leap 15.4 GA chromium-101.0.4951.64-bp154.1.2 |
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA chromedriver-55.0.2883.75-3.1 openSUSE Tumbleweed GA ungoogled-chromium-113.0.5672.92-1.1 |
SUSE Timeline for this CVE
CVE page created: Wed Apr 15 16:01:04 2015CVE page last modified: Mon May 22 00:35:53 2023