CVE-2016-1864

Publication date 19 June 2016

Last updated 25 August 2025


Ubuntu priority

Cvss 3 Severity Score

4.3 · Medium

Score breakdown

The XSS auditor in WebKit, as used in Apple iOS before 9.3 and Safari before 9.1, does not properly handle redirects in block mode, which allows remote attackers to obtain sensitive information via a crafted URL.

Read the notes from the security team

Status

Package Ubuntu Release Status
qtwebkit-opensource-src 16.10 yakkety Ignored end of life
16.04 LTS xenial Ignored no update available
15.10 wily Ignored end of life
14.04 LTS trusty Not in release
12.04 LTS precise Not in release
qtwebkit-source 16.10 yakkety Ignored end of life
16.04 LTS xenial Ignored no update available
15.10 wily Ignored end of life
14.04 LTS trusty Not in release
12.04 LTS precise Ignored end of life
webkit 16.10 yakkety Not in release
16.04 LTS xenial Not in release
15.10 wily Not in release
14.04 LTS trusty Not in release
12.04 LTS precise Ignored end of life
webkit2gtk 16.10 yakkety
Not affected
16.04 LTS xenial
Not affected
15.10 wily Ignored end of life
14.04 LTS trusty Not in release
12.04 LTS precise Not in release
webkitgtk 16.10 yakkety Ignored end of life
16.04 LTS xenial Ignored no update available
15.10 wily Ignored end of life
14.04 LTS trusty Not in release
12.04 LTS precise Not in release

Notes


jdstrand

webkit receives limited support. For details, see https://wiki.ubuntu.com/SecurityTeam/FAQ#webkit webkit in Ubuntu uses the JavaScriptCore (JSC) engine, not V8

Severity score breakdown

Parameter Value
Base score 4.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact None
Vector CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N