ALT-BU-2013-1436-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-6634
The OneClickSigninHelper::ShowInfoBarIfPossible function in browser/ui/sync/one_click_signin_helper.cc in Google Chrome before 31.0.1650.63 uses an incorrect URL during realm validation, which allows remote attackers to conduct session fixation attacks and hijack web sessions by triggering improper sync after a 302 (aka Found) HTTP status code.
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=307159
- https://code.google.com/p/chromium/issues/detail?id=307159
- https://src.chromium.org/viewvc/chrome?revision=236563&view=revision
- https://src.chromium.org/viewvc/chrome?revision=236563&view=revision
Modified: 2024-11-21
CVE-2013-6635
Use-after-free vulnerability in the editing implementation in Blink, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that triggers removal of a node during processing of the DOM tree, related to CompositeEditCommand.cpp and ReplaceSelectionCommand.cpp.
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- 56217
- 56217
- http://support.apple.com/kb/HT6145
- http://support.apple.com/kb/HT6145
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=314469
- https://code.google.com/p/chromium/issues/detail?id=314469
- https://src.chromium.org/viewvc/blink?revision=161598&view=revision
- https://src.chromium.org/viewvc/blink?revision=161598&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-6636
The FrameLoader::notifyIfInitialDocumentAccessed function in core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 31.0.1650.63, makes an incorrect check for an empty document during presentation of a modal dialog, which allows remote attackers to spoof the address bar via vectors involving the document.write method.
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=322959
- https://code.google.com/p/chromium/issues/detail?id=322959
- https://src.chromium.org/viewvc/blink?revision=162673&view=revision
- https://src.chromium.org/viewvc/blink?revision=162673&view=revision
Modified: 2024-11-21
CVE-2013-6637
Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=300892
- https://code.google.com/p/chromium/issues/detail?id=300892
- https://code.google.com/p/chromium/issues/detail?id=305904
- https://code.google.com/p/chromium/issues/detail?id=305904
- https://code.google.com/p/chromium/issues/detail?id=308988
- https://code.google.com/p/chromium/issues/detail?id=308988
- https://code.google.com/p/chromium/issues/detail?id=313435
- https://code.google.com/p/chromium/issues/detail?id=313435
- https://code.google.com/p/chromium/issues/detail?id=317999
- https://code.google.com/p/chromium/issues/detail?id=317999
- https://code.google.com/p/chromium/issues/detail?id=319722
- https://code.google.com/p/chromium/issues/detail?id=319722
- https://code.google.com/p/chromium/issues/detail?id=319835
- https://code.google.com/p/chromium/issues/detail?id=319835
- https://code.google.com/p/chromium/issues/detail?id=319860
- https://code.google.com/p/chromium/issues/detail?id=319860
- https://code.google.com/p/chromium/issues/detail?id=319914
- https://code.google.com/p/chromium/issues/detail?id=319914
- https://code.google.com/p/chromium/issues/detail?id=320313
- https://code.google.com/p/chromium/issues/detail?id=320313
- https://code.google.com/p/chromium/issues/detail?id=322554
- https://code.google.com/p/chromium/issues/detail?id=322554
- https://code.google.com/p/chromium/issues/detail?id=325501
- https://code.google.com/p/chromium/issues/detail?id=325501
Modified: 2024-11-21
CVE-2013-6638
Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
- http://code.google.com/p/v8/source/detail?r=17800
- http://code.google.com/p/v8/source/detail?r=17800
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1962
- openSUSE-SU-2013:1962
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0092
- openSUSE-SU-2014:0092
- 56216
- 56216
- 56217
- 56217
- DSA-2811
- DSA-2811
- [v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)
- [v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=319722
- https://code.google.com/p/chromium/issues/detail?id=319722
Modified: 2024-11-21
CVE-2013-6639
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
- http://code.google.com/p/v8/source/detail?r=17801
- http://code.google.com/p/v8/source/detail?r=17801
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1962
- openSUSE-SU-2013:1962
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0092
- openSUSE-SU-2014:0092
- 56216
- 56216
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=319835
- https://code.google.com/p/chromium/issues/detail?id=319835
Modified: 2024-11-21
CVE-2013-6640
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
- http://code.google.com/p/v8/source/detail?r=17801
- http://code.google.com/p/v8/source/detail?r=17801
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1962
- openSUSE-SU-2013:1962
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0092
- openSUSE-SU-2014:0092
- 56216
- 56216
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=319860
- https://code.google.com/p/chromium/issues/detail?id=319860
Modified: 2024-11-21
CVE-2013-6802
Google Chrome before 31.0.1650.57 allows remote attackers to bypass intended sandbox restrictions by leveraging access to a renderer process, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013, a different vulnerability than CVE-2013-6632.
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319125
- https://code.google.com/p/chromium/issues/detail?id=319125
- google-chrome-cve20136802-sec-bypass(89201)
- google-chrome-cve20136802-sec-bypass(89201)
Closed vulnerabilities
BDU:2021-01400
Уязвимость функции SQLDriverConnect библиотеки ODBC для UNIX UnixODBC, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01401
Уязвимость функции SQLDriverConnect библиотеки ODBC для UNIX UnixODBC, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2012-2657
Buffer overflow in the SQLDriverConnect function in unixODBC 2.0.10, 2.3.1, and earlier allows local users to cause a denial of service (crash) via a long string in the FILEDSN option. NOTE: this issue might not be a vulnerability, since the ability to set this option typically implies that the attacker already has legitimate access to cause a DoS or execute code, and therefore the issue would not cross privilege boundaries. There may be limited attack scenarios if isql command-line options are exposed to an attacker, although it seems likely that other, more serious issues would also be exposed, and this issue might not cross privilege boundaries in that context.
- [oss-security] 20120529 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120529 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120529 CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120529 CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120530 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120530 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120531 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120531 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120605 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120605 Re: CVE id request: Multiple buffer overflow in unixODBC
- 82460
- 82460
- 53712
- 53712
- unixodbc-sdc-bo(75940)
- unixodbc-sdc-bo(75940)
Modified: 2024-11-21
CVE-2012-2658
Buffer overflow in the SQLDriverConnect function in unixODBC 2.3.1 allows local users to cause a denial of service (crash) via a long string in the DRIVER option. NOTE: this issue might not be a vulnerability, since the ability to set this option typically implies that the attacker already has legitimate access to cause a DoS or execute code, and therefore the issue would not cross privilege boundaries. There may be limited attack scenarios if isql command-line options are exposed to an attacker, although it seems likely that other, more serious issues would also be exposed, and this issue might not cross privilege boundaries in that context.
- [oss-security] 20120529 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120529 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120529 CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120529 CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120530 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120530 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120531 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120531 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120605 Re: CVE id request: Multiple buffer overflow in unixODBC
- [oss-security] 20120605 Re: CVE id request: Multiple buffer overflow in unixODBC
- 82460
- 82460
- 53712
- 53712
- unixodbc-sdc-bo(75940)
- unixodbc-sdc-bo(75940)
Closed bugs
Не конфликтует с libunixODBC
Closed bugs
[FR] пересобрать midori с libgranite-devel
[FR] добавить "ALT Packages" поиск