Bug 568188 (CVE-2010-0656)
Summary: | CVE-2010-0656 webkit: possible information disclosure via xhr for file:/// URLs | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | jreznik |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0656 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-19 09:10:38 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 589165, 589169 | ||
Bug Blocks: |
Description
Vincent Danen
2010-02-24 23:26:23 UTC
Chromium bug report references following two WebKit-upstream commits: http://code.google.com/p/chromium/issues/detail?id=20450#c26 http://trac.webkit.org/changeset/51294 http://trac.webkit.org/changeset/51295 CVE only references r51295, while r512494 is the one with most changes. The patch for this was added to WebKit (webkitgtk 1.2.0 contains this change), but the problem depends on browser's ability to generate local directory listings. I've tested couple of WebKit-based browsers in Fedora (GtkLauncher, midori, kazehakase, arora, qt demo browser) and only arora generates directory listings and is hence affected by this problem. However, I think this is more of a hardening fix than a security fix. Script in local file can access other local files (and directories), content of any file can be read by the script (assuming script knows or can guess the file name, and user running browser can read the file). This fix can block malicious script from listing directories, but another cross-domain flaw is required to disclose the information discovered while walking the directory tree to the script author. Hence this does not seem to be a flaw by itself. qt-4.6.2-17.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/qt-4.6.2-17.fc11 qt-4.6.2-17.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/qt-4.6.2-17.fc12 qt-4.6.2-17.fc13 has been submitted as an update for Fedora 13. http://admin.fedoraproject.org/updates/qt-4.6.2-17.fc13 qt-4.6.2-17.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report. qt-4.6.2-17.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report. qt-4.6.2-17.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report. |