First published: Thu Jul 23 2015(Updated: )
core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly determine the V8 context of a microtask, which allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image from an unintended source.
Credit: chrome-cve-admin@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/chromium-browser | ||
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Debian Debian Linux | =8.0 | |
Google Chrome | <=43.0.2357.134 | |
Redhat Enterprise Linux Desktop Supplementary | =6.0 | |
Redhat Enterprise Linux Server Supplementary | =6.0 | |
Redhat Enterprise Linux Server Supplementary Eus | =6.7z | |
Redhat Enterprise Linux Workstation Supplementary | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-1281 is medium (4.3).
CVE-2015-1281 allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image from an unintended source.
The affected software versions include Google Chrome before 44.0.2403.89 and Chromium Browser versions 44.0.2403.89 and earlier.
To fix CVE-2015-1281, update Google Chrome to version 44.0.2403.89 or later, or update Chromium Browser to version 44.0.2403.89 or later.
You can find more information about CVE-2015-1281 at the following references: CVE-2015-1281, Google Chrome Releases Blog, and Ubuntu Security Notices USN-2677-1.