ID CVE-2015-3751
Summary WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, allows remote attackers to bypass a Content Security Policy protection mechanism by using a video control in conjunction with an IMG element within an OBJECT element.
References
Vulnerable Configurations
  • Apple Safari 6.0
    cpe:2.3:a:apple:safari:6.0
  • Apple Safari 6.0.1
    cpe:2.3:a:apple:safari:6.0.1
  • Apple Safari 6.0.2
    cpe:2.3:a:apple:safari:6.0.2
  • Apple Safari 6.0.3
    cpe:2.3:a:apple:safari:6.0.3
  • Apple Safari 6.0.4
    cpe:2.3:a:apple:safari:6.0.4
  • Apple Safari 6.0.5
    cpe:2.3:a:apple:safari:6.0.5
  • Apple Safari 6.1
    cpe:2.3:a:apple:safari:6.1
  • Apple Safari 6.1.1
    cpe:2.3:a:apple:safari:6.1.1
  • Apple Safari 6.1.2
    cpe:2.3:a:apple:safari:6.1.2
  • Apple Safari 6.1.3
    cpe:2.3:a:apple:safari:6.1.3
  • Apple Safari 6.1.4
    cpe:2.3:a:apple:safari:6.1.4
  • Apple Safari 6.1.5
    cpe:2.3:a:apple:safari:6.1.5
  • Apple Safari 6.2.4
    cpe:2.3:a:apple:safari:6.2.4
  • Apple Safari 6.2.5
    cpe:2.3:a:apple:safari:6.2.5
  • Apple Safari 6.2.6
    cpe:2.3:a:apple:safari:6.2.6
  • Apple Safari 7.0
    cpe:2.3:a:apple:safari:7.0
  • Apple Safari 7.0.1
    cpe:2.3:a:apple:safari:7.0.1
  • Apple Safari 7.0.2
    cpe:2.3:a:apple:safari:7.0.2
  • Apple Safari 7.0.3
    cpe:2.3:a:apple:safari:7.0.3
  • Apple Safari 7.0.4
    cpe:2.3:a:apple:safari:7.0.4
  • Apple Safari 7.0.5
    cpe:2.3:a:apple:safari:7.0.5
  • Apple Safari 7.1
    cpe:2.3:a:apple:safari:7.1
  • Apple Safari 7.1.4
    cpe:2.3:a:apple:safari:7.1.4
  • Apple Safari 7.1.5
    cpe:2.3:a:apple:safari:7.1.5
  • Apple Safari 7.1.6
    cpe:2.3:a:apple:safari:7.1.6
  • Apple Safari 8.0
    cpe:2.3:a:apple:safari:8.0
  • Apple Safari 8.0.4
    cpe:2.3:a:apple:safari:8.0.4
  • Apple Safari 8.0.5
    cpe:2.3:a:apple:safari:8.0.5
  • Apple Safari 8.0.6
    cpe:2.3:a:apple:safari:8.0.6
  • Apple iPhone OS 1.0.0
    cpe:2.3:o:apple:iphone_os:1.0.0
  • Apple iPhone OS 1.0.0 iPhone
    cpe:2.3:o:apple:iphone_os:1.0.0:-:iphone
  • Apple iPhone OS 1.0.1
    cpe:2.3:o:apple:iphone_os:1.0.1
  • Apple iPhone OS 1.0.1 iPhone
    cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone
  • Apple iPhone OS 1.0.2
    cpe:2.3:o:apple:iphone_os:1.0.2
  • Apple iPhone OS 1.0.2 iPhone
    cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone
  • Apple iPhone OS 1.1.0
    cpe:2.3:o:apple:iphone_os:1.1.0
  • Apple iPhone OS 1.1.0 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone
  • Apple iPhone OS 1.1.0 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch
  • Apple iPhone OS 1.1.1
    cpe:2.3:o:apple:iphone_os:1.1.1
  • Apple iPhone OS 1.1.1 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone
  • Apple iPhone OS 1.1.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.1:-:ipodtouch
  • Apple iPhone OS 1.1.2
    cpe:2.3:o:apple:iphone_os:1.1.2
  • Apple iPhone OS 1.1.2 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone
  • Apple iPhone OS 1.1.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch
  • Apple iPhone OS 1.1.3
    cpe:2.3:o:apple:iphone_os:1.1.3
  • Apple iPhone OS 1.1.3 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone
  • Apple iPhone OS 1.1.3 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch
  • Apple iPhone OS 1.1.4
    cpe:2.3:o:apple:iphone_os:1.1.4
  • Apple iPhone OS 1.1.4 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone
  • Apple iPhone OS 1.1.4 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch
  • Apple iPhone OS 1.1.5
    cpe:2.3:o:apple:iphone_os:1.1.5
  • Apple iPhone OS 1.1.5 iPhone
    cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone
  • Apple iPhone OS 1.1.5 iPodTouch
    cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch
  • Apple iPhone OS 2.0
    cpe:2.3:o:apple:iphone_os:2.0
  • Apple iPhone OS 2.0.0
    cpe:2.3:o:apple:iphone_os:2.0.0
  • Apple iPhone OS 2.0.0 iPhone
    cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone
  • Apple iPhone OS 2.0.0 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch
  • Apple iPhone OS 2.0.1
    cpe:2.3:o:apple:iphone_os:2.0.1
  • Apple iPhone OS 2.0.1
    cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone
  • Apple iPhone OS 2.0.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch
  • Apple iPhone OS 2.0.2
    cpe:2.3:o:apple:iphone_os:2.0.2
  • Apple iPhone OS 2.0.2 iPhone
    cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone
  • Apple iPhone OS 2.0.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch
  • Apple iPhone OS 2.1
    cpe:2.3:o:apple:iphone_os:2.1
  • Apple iPhone OS 2.1 iPhone
    cpe:2.3:o:apple:iphone_os:2.1:-:iphone
  • Apple iPhone OS 2.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch
  • Apple iPhone OS 2.1.1
    cpe:2.3:o:apple:iphone_os:2.1.1
  • Apple iPhone OS 2.2
    cpe:2.3:o:apple:iphone_os:2.2
  • Apple iPhone OS 2.2 iPhone
    cpe:2.3:o:apple:iphone_os:2.2:-:iphone
  • Apple iPhone OS 2.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.2:-:ipodtouch
  • Apple iPhone OS 2.2.1
    cpe:2.3:o:apple:iphone_os:2.2.1
  • Apple iPhone OS 2.2.1 iPhone
    cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone
  • Apple iPhone OS 2.2.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch
  • Apple iPhone OS 3.0
    cpe:2.3:o:apple:iphone_os:3.0
  • Apple iPhone OS 3.0 iPhone
    cpe:2.3:o:apple:iphone_os:3.0:-:iphone
  • Apple iPhone OS 3.0 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch
  • Apple iPhone OS 3.0.1
    cpe:2.3:o:apple:iphone_os:3.0.1
  • Apple iPhone OS 3.0.1 iPhone
    cpe:2.3:o:apple:iphone_os:3.0.1:-:iphone
  • Apple iPhone OS 3.0.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch
  • Apple iPhone OS 3.1
    cpe:2.3:o:apple:iphone_os:3.1
  • Apple iPhone OS 3.1 for iPod Touch
    cpe:2.3:o:apple:iphone_os:3.1:-:-:-:-:ipod_touch
  • Apple iPhone OS 3.1 iPhone
    cpe:2.3:o:apple:iphone_os:3.1:-:iphone
  • Apple iPhone OS 3.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch
  • Apple iPhone OS 3.1.1 for iPod Touch
    cpe:2.3:o:apple:iphone_os:3.1.1:-:-:-:-:ipod_touch
  • Apple iPhone OS 3.1.2
    cpe:2.3:o:apple:iphone_os:3.1.2
  • Apple iPhone OS 3.1.2 iPhone
    cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone
  • Apple iPhone OS 3.1.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch
  • Apple iPhone OS 3.1.3
    cpe:2.3:o:apple:iphone_os:3.1.3
  • Apple iPhone OS 3.1.3 iPhone
    cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone
  • Apple iPhone OS 3.1.3 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.1.3:-:ipodtouch
  • Apple iPhone OS 3.2
    cpe:2.3:o:apple:iphone_os:3.2
  • Apple iPhone OS 3.2 iPhone
    cpe:2.3:o:apple:iphone_os:3.2:-:iphone
  • Apple iPhone OS 3.2 iPodTouch
    cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch
  • Apple iPhone OS 3.2.1
    cpe:2.3:o:apple:iphone_os:3.2.1
  • Apple iPhone OS 3.2.1:-:ipad
    cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad
  • Apple iPhone OS 3.2.2
    cpe:2.3:o:apple:iphone_os:3.2.2
  • Apple iPhone OS 4.0
    cpe:2.3:o:apple:iphone_os:4.0
  • Apple iPhone OS 4.0 iPhone
    cpe:2.3:o:apple:iphone_os:4.0:-:iphone
  • Apple iPhone OS 4.0 iPodTouch
    cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch
  • Apple iPhone OS 4.0.1
    cpe:2.3:o:apple:iphone_os:4.0.1
  • Apple iPhone OS 4.0.1 iPhone
    cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone
  • Apple iPhone OS 4.0.1 iPodTouch
    cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch
  • Apple iPhone OS 4.0.2
    cpe:2.3:o:apple:iphone_os:4.0.2
  • Apple iPhone OS 4.1
    cpe:2.3:o:apple:iphone_os:4.1
  • Apple iPhone OS 4.2.1
    cpe:2.3:o:apple:iphone_os:4.2.1
  • Apple iPhone OS 4.2.5
    cpe:2.3:o:apple:iphone_os:4.2.5
  • Apple iPhone OS 4.2.8
    cpe:2.3:o:apple:iphone_os:4.2.8
  • Apple iPhone OS 4.3.0
    cpe:2.3:o:apple:iphone_os:4.3.0
  • Apple iPhone OS 4.3.1
    cpe:2.3:o:apple:iphone_os:4.3.1
  • Apple iPhone OS 4.3.2
    cpe:2.3:o:apple:iphone_os:4.3.2
  • Apple iPhone OS 4.3.3
    cpe:2.3:o:apple:iphone_os:4.3.3
  • Apple iPhone OS 4.3.5
    cpe:2.3:o:apple:iphone_os:4.3.5
  • Apple iPhone OS 4.3.5 iPad
    cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad
  • Apple iPhone OS 4.3.5 iPodTouch
    cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch
  • Apple iPhone OS 5.0
    cpe:2.3:o:apple:iphone_os:5.0
  • Apple iPhone OS 5.0 iPad
    cpe:2.3:o:apple:iphone_os:5.0:-:ipad
  • Apple iPhone OS 5.0 iPhone
    cpe:2.3:o:apple:iphone_os:5.0:-:iphone
  • Apple iPhone OS 5.0iPod touch
    cpe:2.3:o:apple:iphone_os:5.0:-:ipodtouch
  • Apple iPhone OS 5.0.1
    cpe:2.3:o:apple:iphone_os:5.0.1
  • Apple iPhone OS 5.0.1 iPad
    cpe:2.3:o:apple:iphone_os:5.0.1:-:ipad
  • Apple iPhone OS 5.0.1 iPhone
    cpe:2.3:o:apple:iphone_os:5.0.1:-:iphone
  • Apple iPhone OS 5.0.1 iPod touch
    cpe:2.3:o:apple:iphone_os:5.0.1:-:ipodtouch
  • Apple iPhone OS 5.1
    cpe:2.3:o:apple:iphone_os:5.1
  • Apple iPhone OS 5.1.1
    cpe:2.3:o:apple:iphone_os:5.1.1
  • Apple iPhone OS 6.0
    cpe:2.3:o:apple:iphone_os:6.0
  • Apple iPhone OS 6.0.1
    cpe:2.3:o:apple:iphone_os:6.0.1
  • Apple iPhone OS 6.0.2
    cpe:2.3:o:apple:iphone_os:6.0.2
  • Apple iPhone OS 6.1
    cpe:2.3:o:apple:iphone_os:6.1
  • Apple iPhone OS 6.1.2
    cpe:2.3:o:apple:iphone_os:6.1.2
  • Apple iPhone OS 6.1.3
    cpe:2.3:o:apple:iphone_os:6.1.3
  • Apple iPhone OS 6.1.4
    cpe:2.3:o:apple:iphone_os:6.1.4
  • Apple iPhone OS 6.1.5
    cpe:2.3:o:apple:iphone_os:6.1.5
  • Apple iPhone OS 6.1.6
    cpe:2.3:o:apple:iphone_os:6.1.6
  • Apple iPhone OS 7.0
    cpe:2.3:o:apple:iphone_os:7.0
  • Apple iPhone OS 7.0.1
    cpe:2.3:o:apple:iphone_os:7.0.1
  • Apple iPhone OS 7.0.2
    cpe:2.3:o:apple:iphone_os:7.0.2
  • Apple iPhone OS 7.0.3
    cpe:2.3:o:apple:iphone_os:7.0.3
  • Apple iPhone OS 7.0.4
    cpe:2.3:o:apple:iphone_os:7.0.4
  • Apple iPhone OS 7.0.5
    cpe:2.3:o:apple:iphone_os:7.0.5
  • Apple iPhone OS 7.0.6
    cpe:2.3:o:apple:iphone_os:7.0.6
  • Apple iPhone OS 7.1
    cpe:2.3:o:apple:iphone_os:7.1
  • Apple iPhone OS 7.1.1
    cpe:2.3:o:apple:iphone_os:7.1.1
  • Apple iPhone OS 7.1.2
    cpe:2.3:o:apple:iphone_os:7.1.2
  • Apple iPhone OS 8.0
    cpe:2.3:o:apple:iphone_os:8.0
  • Apple iPhone OS 8.0.1
    cpe:2.3:o:apple:iphone_os:8.0.1
  • Apple iPhone OS 8.0.2
    cpe:2.3:o:apple:iphone_os:8.0.2
  • Apple iPhone OS 8.1
    cpe:2.3:o:apple:iphone_os:8.1
  • Apple iPhone OS 8.1.2
    cpe:2.3:o:apple:iphone_os:8.1.2
  • Apple iPhone OS 8.1.3
    cpe:2.3:o:apple:iphone_os:8.1.3
  • Apple iPhone OS 8.2
    cpe:2.3:o:apple:iphone_os:8.2
  • Apple iPhone OS 8.3
    cpe:2.3:o:apple:iphone_os:8.3
CVSS
Base: 5.0 (as of 18-08-2015 - 08:19)
Impact:
Exploitability:
CWE CWE-254
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
nessus via4
  • NASL family Misc.
    NASL id APPLETV_7_2_1.NASL
    description According to its banner, the remote Apple TV device is a version prior to 7.2.1. It is, therefore, affected by multiple vulnerabilities in the following components : - bootp - CFPreferences - CloudKit - Code Signing - CoreMedia Playback - CoreText - DiskImages - FontParser - ImageIO - IOHIDFamily - IOKit - Kernel - Libc - Libinfo - libpthread - libxml2 - libxpc - libxslt - Location Framework - Office Viewer - QL Office - Sandbox_profiles - WebKit
    last seen 2019-02-21
    modified 2018-12-14
    plugin id 90315
    published 2016-04-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=90315
    title Apple TV < 7.2.1 Multiple Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SAFARI8_0_8.NASL
    description The version of Apple Safari installed on the remote Mac OS X host is prior to 6.2.8 / 7.1.8 / 8.0.8. It is, therefore, affected by the following vulnerabilities : - An unspecified flaw exists that allows an attacker to spoof UI elements by using crafted web pages. (CVE-2015-3729) - Multiple memory corruption flaws exist in WebKit due to improper validation of user-supplied input. An attacker can exploit these, by using a crafted web page, to execute arbitrary code. (CVE-2015-3730, CVE-2015-3731 CVE-2015-3732, CVE-2015-3733, CVE-2015-3734, CVE-2015-3735, CVE-2015-3736, CVE-2015-3737, CVE-2015-3738, CVE-2015-3739, CVE-2015-3740, CVE-2015-3741, CVE-2015-3742, CVE-2015-3743, CVE-2015-3744, CVE-2015-3745, CVE-2015-3746, CVE-2015-3747, CVE-2015-3748, CVE-2015-3749) - A security policy bypass vulnerability exists in WebKit related to handling Content Security Policy report requests. An attacker can exploit this to bypass the HTTP Strict Transport Security policy. (CVE-2015-3750) - A security policy bypass vulnerability exists in WebKit that allows websites to use video controls to load images nested in object elements in violation of Content Security Policy directives. (CVE-2015-3751) - An information disclosure vulnerability exists in WebKit related to how cookies are added to Content Security Policy report requests, which results in cookies being exposed to cross-origin requests. Also, cookies set during regular browsing are sent during private browsing. (CVE-2015-3752) - An information disclosure vulnerability exists in the WebKit Canvas component when images are called using URLs that redirect to a data:image resource. An attacker, using a malicious website, can exploit this to disclose image data cross-origin. (CVE-2015-3753) - An information disclosure vulnerability exists in WebKit page loading where the caching of HTTP authentication credentials entered in private browsing mode were carried over into regular browsing, resulting in a user's private browsing history being exposed. (CVE-2015-3754) - A flaw in the WebKit process model allows a malicious website to display an arbitrary URL, which can allow user interface spoofing. (CVE-2015-3755)
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 85446
    published 2015-08-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=85446
    title Mac OS X : Apple Safari < 6.2.8 / 7.1.8 / 8.0.8 Multiple Vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2015-006.NASL
    description The remote host is running a version of Mac OS X 10.8.5 or 10.9.5 that is missing Security Update 2015-006. It is, therefore, affected by multiple vulnerabilities in the following components : - apache - apache_mod_php - CoreText - FontParser - Libinfo - libxml2 - OpenSSL - perl - PostgreSQL - QL Office - Quartz Composer Framework - QuickTime 7 - SceneKit Note that successful exploitation of the most serious issues can result in arbitrary code execution.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 85409
    published 2015-08-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=85409
    title Mac OS X Multiple Vulnerabilities (Security Update 2015-006)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_10_10_5.NASL
    description The remote host is running a version of Mac OS X 10.10.x that is prior to 10.10.5. It is, therefore, affected by multiple vulnerabilities in the following components : - apache - apache_mod_php - Apple ID OD Plug-in - AppleGraphicsControl - Bluetooth - bootp - CloudKit - CoreMedia Playback - CoreText - curl - Data Detectors Engine - Date & Time pref pane - Dictionary Application - DiskImages - dyld - FontParser - groff - ImageIO - Install Framework Legacy - IOFireWireFamily - IOGraphics - IOHIDFamily - Kernel - Libc - Libinfo - libpthread - libxml2 - libxpc - mail_cmds - Notification Center OSX - ntfs - OpenSSH - OpenSSL - perl - PostgreSQL - python - QL Office - Quartz Composer Framework - Quick Look - QuickTime 7 - SceneKit - Security - SMBClient - Speech UI - sudo - tcpdump - Text Formats - udf Note that successful exploitation of the most serious issues can result in arbitrary code execution.
    last seen 2019-02-21
    modified 2018-07-16
    plugin id 85408
    published 2015-08-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=85408
    title Mac OS X 10.10.x < 10.10.5 Multiple Vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2016-340.NASL
    description This update for webkit2gtk3 fixes the following issues : - Update to version 2.10.7 : + Fix the build with GTK+ < 3.16. - Changes from version 2.10.6 : + Fix a deadlock in the Web Process when JavaScript garbage collector was running for a web worker thread that made google maps to hang. + Fix media controls displaying without controls attribute. + Fix a Web Process crash when quickly attempting many DnD operations. - Changes from version 2.10.5 : + Disable DNS prefetch when a proxy is configured. + Reduce the maximum simultaneous network connections to match other browsers. + Make WebKitWebView always propagate motion-notify-event signal. + Add a way to force accelerating compositing mode at runtime using an environment variable. + Fix input elements and scrollbars rendering with GTK+ 3.19. + Fix rendering of lines when using solid colors. + Fix UI process crashes related to not having a main resource response when the load is committed for pages restored from the history cache. + Fix a WebProcess crash when loading large contents with custom URI schemes API. + Fix a crash in the UI process when the WebView is destroyed while the screensaver DBus proxy is being created. + Fix WebProcess crashes due to BadDrawable X errors in accelerated compositing mode. + Fix crashes on PPC64 due to mprotect() on address not aligned to the page size. + Fix std::bad_function_call exception raised in dispatchDecidePolicyForNavigationAction. + Fix downloads of data URLs. + Fix runtime critical warnings when closing a page containing windowed plugins. + Fix several crashes and rendering issues. + Translation updates: French, German, Italian, Turkish. + Security fixes: CVE-2015-7096, CVE-2015-7098. - Update to version 2.10.4, notable changes : + New HTTP disk cache for the Network Process. + New Web Inspector UI. + Automatic ScreenServer inhibition when playing fullscreen videos. + Initial Editor API. + Performance improvements. - This update addresses the following security issues: CVE-2015-1122, CVE-2015-1152, CVE-2015-1155, CVE-2015-3660, CVE-2015-3730, CVE-2015-3738, CVE-2015-3740, CVE-2015-3742, CVE-2015-3744, CVE-2015-3746, CVE-2015-3750, CVE-2015-3751, CVE-2015-3754, CVE-2015-3755, CVE-2015-5804, CVE-2015-5805, CVE-2015-5807, CVE-2015-5810, CVE-2015-5813, CVE-2015-5814, CVE-2015-5815, CVE-2015-5817, CVE-2015-5818, CVE-2015-5825, CVE-2015-5827, CVE-2015-5828, CVE-2015-5929, CVE-2015-5930, CVE-2015-5931, CVE-2015-7002, CVE-2015-7013, CVE-2015-7014, CVE-2015-7048, CVE-2015-7095, CVE-2015-7097, CVE-2015-7099, CVE-2015-7100, CVE-2015-7102, CVE-2015-7103, CVE-2015-7104 - Add BuildRequires: hyphen-devel to pick up hyphenation support. Note this is broken upstream. - Build with -DENABLE_DATABASE_PROCESS=OFF and -DENABLE_INDEXED_DATABASE=OFF to avoid an issue with GCC 4.8.
    last seen 2019-02-21
    modified 2016-03-16
    plugin id 89950
    published 2016-03-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=89950
    title openSUSE Security Update : webkit2gtk3 (openSUSE-2016-340)
refmap via4
apple
  • APPLE-SA-2015-08-13-1
  • APPLE-SA-2015-08-13-3
bid 76341
confirm
sectrack 1033274
suse openSUSE-SU-2016:0761
Last major update 23-12-2016 - 21:59
Published 16-08-2015 - 19:59
Last modified 07-02-2019 - 14:52
Back to Top