ALT-BU-2013-1358-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-2906
Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.cpp, core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=223962
- https://code.google.com/p/chromium/issues/detail?id=223962
- https://code.google.com/p/chromium/issues/detail?id=270758
- https://code.google.com/p/chromium/issues/detail?id=270758
- https://code.google.com/p/chromium/issues/detail?id=271161
- https://code.google.com/p/chromium/issues/detail?id=271161
- https://code.google.com/p/chromium/issues/detail?id=284785
- https://code.google.com/p/chromium/issues/detail?id=284785
- https://code.google.com/p/chromium/issues/detail?id=284786
- https://code.google.com/p/chromium/issues/detail?id=284786
- oval:org.mitre.oval:def:19013
- oval:org.mitre.oval:def:19013
- https://src.chromium.org/viewvc/blink?revision=157243&view=revision
- https://src.chromium.org/viewvc/blink?revision=157243&view=revision
- https://src.chromium.org/viewvc/blink?revision=157245&view=revision
- https://src.chromium.org/viewvc/blink?revision=157245&view=revision
- https://src.chromium.org/viewvc/blink?revision=157256&view=revision
- https://src.chromium.org/viewvc/blink?revision=157256&view=revision
- https://src.chromium.org/viewvc/blink?revision=157259&view=revision
- https://src.chromium.org/viewvc/blink?revision=157259&view=revision
- https://src.chromium.org/viewvc/blink?revision=157273&view=revision
- https://src.chromium.org/viewvc/blink?revision=157273&view=revision
Modified: 2024-11-21
CVE-2013-2907
The Window.prototype object implementation in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=260667
- https://code.google.com/p/chromium/issues/detail?id=260667
- oval:org.mitre.oval:def:18695
- oval:org.mitre.oval:def:18695
Modified: 2024-11-21
CVE-2013-2908
Google Chrome before 30.0.1599.66 uses incorrect function calls to determine the values of NavigationEntry objects, which allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=265221
- https://code.google.com/p/chromium/issues/detail?id=265221
- oval:org.mitre.oval:def:18782
- oval:org.mitre.oval:def:18782
- https://src.chromium.org/viewvc/chrome?revision=217485&view=revision
- https://src.chromium.org/viewvc/chrome?revision=217485&view=revision
Modified: 2024-11-21
CVE-2013-2909
Use-after-free vulnerability in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to inline-block rendering for bidirectional Unicode text in an element isolated from its siblings.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=265838
- https://code.google.com/p/chromium/issues/detail?id=265838
- https://code.google.com/p/chromium/issues/detail?id=279277
- https://code.google.com/p/chromium/issues/detail?id=279277
- oval:org.mitre.oval:def:19012
- oval:org.mitre.oval:def:19012
- https://src.chromium.org/viewvc/blink?revision=156580&view=revision
- https://src.chromium.org/viewvc/blink?revision=156580&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2910
Use-after-free vulnerability in modules/webaudio/AudioScheduledSourceNode.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=269753
- https://code.google.com/p/chromium/issues/detail?id=269753
- oval:org.mitre.oval:def:18812
- oval:org.mitre.oval:def:18812
- https://src.chromium.org/viewvc/blink?revision=157615&view=revision
- https://src.chromium.org/viewvc/blink?revision=157615&view=revision
Modified: 2024-11-21
CVE-2013-2911
Use-after-free vulnerability in the XSLStyleSheet::compileStyleSheet function in core/xml/XSLStyleSheetLibxslt.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of post-failure recompilation in unspecified libxslt versions.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=271939
- https://code.google.com/p/chromium/issues/detail?id=271939
- oval:org.mitre.oval:def:18687
- oval:org.mitre.oval:def:18687
- https://src.chromium.org/viewvc/blink?revision=156248&view=revision
- https://src.chromium.org/viewvc/blink?revision=156248&view=revision
Modified: 2024-11-21
CVE-2013-2912
Use-after-free vulnerability in the PepperInProcessRouter::SendToHost function in content/renderer/pepper/pepper_in_process_router.cc in the Pepper Plug-in API (PPAPI) in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a resource-destruction message.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=276368
- https://code.google.com/p/chromium/issues/detail?id=276368
- oval:org.mitre.oval:def:18962
- oval:org.mitre.oval:def:18962
- https://src.chromium.org/viewvc/chrome?revision=222614&view=revision
- https://src.chromium.org/viewvc/chrome?revision=222614&view=revision
Modified: 2024-11-21
CVE-2013-2913
Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=278908
- https://code.google.com/p/chromium/issues/detail?id=278908
- oval:org.mitre.oval:def:18843
- oval:org.mitre.oval:def:18843
- https://src.chromium.org/viewvc/blink?revision=157914&view=revision
- https://src.chromium.org/viewvc/blink?revision=157914&view=revision
Modified: 2024-11-21
CVE-2013-2915
Google Chrome before 30.0.1599.66 preserves pending NavigationEntry objects in certain invalid circumstances, which allows remote attackers to spoof the address bar via a URL with a malformed scheme, as demonstrated by a nonexistent:12121 URL.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=280512
- https://code.google.com/p/chromium/issues/detail?id=280512
- oval:org.mitre.oval:def:18319
- oval:org.mitre.oval:def:18319
- https://src.chromium.org/viewvc/chrome?revision=222146&view=revision
- https://src.chromium.org/viewvc/chrome?revision=222146&view=revision
Modified: 2024-11-21
CVE-2013-2916
Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code, in conjunction with a delay in notifying the user of an attempted spoof.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=281256
- https://code.google.com/p/chromium/issues/detail?id=281256
- oval:org.mitre.oval:def:18968
- oval:org.mitre.oval:def:18968
- https://src.chromium.org/viewvc/blink?revision=157196&view=revision
- https://src.chromium.org/viewvc/blink?revision=157196&view=revision
Modified: 2024-11-21
CVE-2013-2917
The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=281480
- https://code.google.com/p/chromium/issues/detail?id=281480
- oval:org.mitre.oval:def:18820
- oval:org.mitre.oval:def:18820
- https://src.chromium.org/viewvc/blink?revision=157007&view=revision
- https://src.chromium.org/viewvc/blink?revision=157007&view=revision
Modified: 2024-11-21
CVE-2013-2918
Use-after-free vulnerability in the RenderBlock::collapseAnonymousBlockChild function in core/rendering/RenderBlock.cpp in the DOM implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect handling of parent-child relationships for anonymous blocks.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=282088
- https://code.google.com/p/chromium/issues/detail?id=282088
- oval:org.mitre.oval:def:18839
- oval:org.mitre.oval:def:18839
- https://src.chromium.org/viewvc/blink?revision=157392&view=revision
- https://src.chromium.org/viewvc/blink?revision=157392&view=revision
Modified: 2024-11-21
CVE-2013-2919
Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=282736
- https://code.google.com/p/chromium/issues/detail?id=282736
- oval:org.mitre.oval:def:18840
- oval:org.mitre.oval:def:18840
Modified: 2024-11-21
CVE-2013-2920
The DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via a relative URL containing a hostname, as demonstrated by a protocol-relative URL beginning with a //www.google.com/ substring.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=285742
- https://code.google.com/p/chromium/issues/detail?id=285742
- oval:org.mitre.oval:def:18451
- oval:org.mitre.oval:def:18451
- https://src.chromium.org/viewvc/chrome?revision=223735&view=revision
- https://src.chromium.org/viewvc/chrome?revision=223735&view=revision
Modified: 2024-11-21
CVE-2013-2921
Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=286414
- https://code.google.com/p/chromium/issues/detail?id=286414
- oval:org.mitre.oval:def:18389
- oval:org.mitre.oval:def:18389
- https://src.chromium.org/viewvc/blink?revision=157760&view=revision
- https://src.chromium.org/viewvc/blink?revision=157760&view=revision
Modified: 2024-11-21
CVE-2013-2922
Use-after-free vulnerability in core/html/HTMLTemplateElement.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that operates on a TEMPLATE element.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=286975
- https://code.google.com/p/chromium/issues/detail?id=286975
- oval:org.mitre.oval:def:18358
- oval:org.mitre.oval:def:18358
- https://src.chromium.org/viewvc/blink?revision=157543&view=revision
- https://src.chromium.org/viewvc/blink?revision=157543&view=revision
Modified: 2024-11-21
CVE-2013-2923
Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.66 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=237800
- https://code.google.com/p/chromium/issues/detail?id=237800
- https://code.google.com/p/chromium/issues/detail?id=246724
- https://code.google.com/p/chromium/issues/detail?id=246724
- https://code.google.com/p/chromium/issues/detail?id=254728
- https://code.google.com/p/chromium/issues/detail?id=254728
- https://code.google.com/p/chromium/issues/detail?id=257852
- https://code.google.com/p/chromium/issues/detail?id=257852
- https://code.google.com/p/chromium/issues/detail?id=260138
- https://code.google.com/p/chromium/issues/detail?id=260138
- https://code.google.com/p/chromium/issues/detail?id=264211
- https://code.google.com/p/chromium/issues/detail?id=264211
- https://code.google.com/p/chromium/issues/detail?id=265493
- https://code.google.com/p/chromium/issues/detail?id=265493
- https://code.google.com/p/chromium/issues/detail?id=265731
- https://code.google.com/p/chromium/issues/detail?id=265731
- https://code.google.com/p/chromium/issues/detail?id=266593
- https://code.google.com/p/chromium/issues/detail?id=266593
- https://code.google.com/p/chromium/issues/detail?id=267068
- https://code.google.com/p/chromium/issues/detail?id=267068
- https://code.google.com/p/chromium/issues/detail?id=269835
- https://code.google.com/p/chromium/issues/detail?id=269835
- https://code.google.com/p/chromium/issues/detail?id=274020
- https://code.google.com/p/chromium/issues/detail?id=274020
- https://code.google.com/p/chromium/issues/detail?id=276111
- https://code.google.com/p/chromium/issues/detail?id=276111
- https://code.google.com/p/chromium/issues/detail?id=277656
- https://code.google.com/p/chromium/issues/detail?id=277656
- https://code.google.com/p/chromium/issues/detail?id=278366
- https://code.google.com/p/chromium/issues/detail?id=278366
- https://code.google.com/p/chromium/issues/detail?id=279286
- https://code.google.com/p/chromium/issues/detail?id=279286
- https://code.google.com/p/chromium/issues/detail?id=284792
- https://code.google.com/p/chromium/issues/detail?id=284792
- https://code.google.com/p/chromium/issues/detail?id=285380
- https://code.google.com/p/chromium/issues/detail?id=285380
- https://code.google.com/p/chromium/issues/detail?id=288761
- https://code.google.com/p/chromium/issues/detail?id=288761
- https://code.google.com/p/chromium/issues/detail?id=288771
- https://code.google.com/p/chromium/issues/detail?id=288771
- https://code.google.com/p/chromium/issues/detail?id=289648
- https://code.google.com/p/chromium/issues/detail?id=289648
- https://code.google.com/p/chromium/issues/detail?id=293521
- https://code.google.com/p/chromium/issues/detail?id=293521
- https://code.google.com/p/chromium/issues/detail?id=294023
- https://code.google.com/p/chromium/issues/detail?id=294023
- https://code.google.com/p/chromium/issues/detail?id=294202
- https://code.google.com/p/chromium/issues/detail?id=294202
- https://code.google.com/p/chromium/issues/detail?id=294206
- https://code.google.com/p/chromium/issues/detail?id=294206
- https://code.google.com/p/chromium/issues/detail?id=299016
- https://code.google.com/p/chromium/issues/detail?id=299016
- oval:org.mitre.oval:def:18103
- oval:org.mitre.oval:def:18103
Modified: 2024-11-21
CVE-2013-2924
Use-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
- http://bugs.icu-project.org/trac/ticket/10318
- http://bugs.icu-project.org/trac/ticket/10318
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- JVN#85336306
- JVN#85336306
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- DSA-2786
- DSA-2786
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- 64758
- 64758
- https://code.google.com/p/chromium/issues/detail?id=275803
- https://code.google.com/p/chromium/issues/detail?id=275803
- oval:org.mitre.oval:def:19017
- oval:org.mitre.oval:def:19017
- https://src.chromium.org/viewvc/chrome?revision=219151&view=revision
- https://src.chromium.org/viewvc/chrome?revision=219151&view=revision
Modified: 2024-11-21
CVE-2013-2925
Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=292422
- https://code.google.com/p/chromium/issues/detail?id=292422
- oval:org.mitre.oval:def:18866
- oval:org.mitre.oval:def:18866
- https://src.chromium.org/viewvc/blink?revision=158146&view=revision
- https://src.chromium.org/viewvc/blink?revision=158146&view=revision
Modified: 2024-11-21
CVE-2013-2926
Use-after-free vulnerability in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to list elements.
- APPLE-SA-2014-04-01-1
- APPLE-SA-2014-04-01-1
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=294456
- https://code.google.com/p/chromium/issues/detail?id=294456
- oval:org.mitre.oval:def:18837
- oval:org.mitre.oval:def:18837
- https://src.chromium.org/viewvc/blink?revision=158727&view=revision
- https://src.chromium.org/viewvc/blink?revision=158727&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2927
Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements.
- APPLE-SA-2014-05-21-1
- APPLE-SA-2014-05-21-1
- APPLE-SA-2014-06-30-3
- APPLE-SA-2014-06-30-3
- APPLE-SA-2014-06-30-4
- APPLE-SA-2014-06-30-4
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6254
- http://support.apple.com/kb/HT6254
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=297478
- https://code.google.com/p/chromium/issues/detail?id=297478
- oval:org.mitre.oval:def:19155
- oval:org.mitre.oval:def:19155
- https://src.chromium.org/viewvc/blink?revision=158428&view=revision
- https://src.chromium.org/viewvc/blink?revision=158428&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2928
Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- APPLE-SA-2014-04-01-1
- APPLE-SA-2014-04-01-1
- http://crbug.com/303657
- http://crbug.com/303657
- http://crbug.com/303772
- http://crbug.com/303772
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=305790
- https://code.google.com/p/chromium/issues/detail?id=305790
- oval:org.mitre.oval:def:19065
- oval:org.mitre.oval:def:19065
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Package phpMyAdmin updated to version 4.0.9-alt1 for branch sisyphus in task 108405.
Closed bugs
заниженный memory_limit
Closed bugs
getenv does not work