WebKit before r51295, as used in Google Chrome before 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows attackers to obtain sensitive information or possibly have unspecified other impact via a crafted local HTML document.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14501
https://bugs.webkit.org/show_bug.cgi?id=31329
http://www.vupen.com/english/advisories/2011/0552
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2010/2722
http://www.ubuntu.com/usn/USN-1006-1
http://www.securityfocus.com/bid/38372
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://trac.webkit.org/changeset/51295
http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs
http://securitytracker.com/id?1023506
http://secunia.com/advisories/43068
http://secunia.com/advisories/41856
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html
http://googlechromereleases.blogspot.com/2010/01/stable-channel-update_25.html