ALT-BU-2014-2587-1
Branch c7 update bulletin.
Closed vulnerabilities
BDU:2015-06136
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06137
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06138
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06139
Множественные уязвимости пакета libjpeg-turbo-static-1.2.1 операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07110
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07111
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07112
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09076
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09077
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09078
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09079
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09080
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09081
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09082
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2019-04721
Уязвимость расширения Kaspersky Protection браузера Google Chrome, позволяющая нарушителю удалить произвольные расширения chrome
Modified: 2024-11-21
CVE-2013-2906
Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.cpp, core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=223962
- https://code.google.com/p/chromium/issues/detail?id=223962
- https://code.google.com/p/chromium/issues/detail?id=270758
- https://code.google.com/p/chromium/issues/detail?id=270758
- https://code.google.com/p/chromium/issues/detail?id=271161
- https://code.google.com/p/chromium/issues/detail?id=271161
- https://code.google.com/p/chromium/issues/detail?id=284785
- https://code.google.com/p/chromium/issues/detail?id=284785
- https://code.google.com/p/chromium/issues/detail?id=284786
- https://code.google.com/p/chromium/issues/detail?id=284786
- oval:org.mitre.oval:def:19013
- oval:org.mitre.oval:def:19013
- https://src.chromium.org/viewvc/blink?revision=157243&view=revision
- https://src.chromium.org/viewvc/blink?revision=157243&view=revision
- https://src.chromium.org/viewvc/blink?revision=157245&view=revision
- https://src.chromium.org/viewvc/blink?revision=157245&view=revision
- https://src.chromium.org/viewvc/blink?revision=157256&view=revision
- https://src.chromium.org/viewvc/blink?revision=157256&view=revision
- https://src.chromium.org/viewvc/blink?revision=157259&view=revision
- https://src.chromium.org/viewvc/blink?revision=157259&view=revision
- https://src.chromium.org/viewvc/blink?revision=157273&view=revision
- https://src.chromium.org/viewvc/blink?revision=157273&view=revision
Modified: 2024-11-21
CVE-2013-2907
The Window.prototype object implementation in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=260667
- https://code.google.com/p/chromium/issues/detail?id=260667
- oval:org.mitre.oval:def:18695
- oval:org.mitre.oval:def:18695
Modified: 2024-11-21
CVE-2013-2908
Google Chrome before 30.0.1599.66 uses incorrect function calls to determine the values of NavigationEntry objects, which allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=265221
- https://code.google.com/p/chromium/issues/detail?id=265221
- oval:org.mitre.oval:def:18782
- oval:org.mitre.oval:def:18782
- https://src.chromium.org/viewvc/chrome?revision=217485&view=revision
- https://src.chromium.org/viewvc/chrome?revision=217485&view=revision
Modified: 2024-11-21
CVE-2013-2909
Use-after-free vulnerability in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to inline-block rendering for bidirectional Unicode text in an element isolated from its siblings.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=265838
- https://code.google.com/p/chromium/issues/detail?id=265838
- https://code.google.com/p/chromium/issues/detail?id=279277
- https://code.google.com/p/chromium/issues/detail?id=279277
- oval:org.mitre.oval:def:19012
- oval:org.mitre.oval:def:19012
- https://src.chromium.org/viewvc/blink?revision=156580&view=revision
- https://src.chromium.org/viewvc/blink?revision=156580&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2910
Use-after-free vulnerability in modules/webaudio/AudioScheduledSourceNode.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=269753
- https://code.google.com/p/chromium/issues/detail?id=269753
- oval:org.mitre.oval:def:18812
- oval:org.mitre.oval:def:18812
- https://src.chromium.org/viewvc/blink?revision=157615&view=revision
- https://src.chromium.org/viewvc/blink?revision=157615&view=revision
Modified: 2024-11-21
CVE-2013-2911
Use-after-free vulnerability in the XSLStyleSheet::compileStyleSheet function in core/xml/XSLStyleSheetLibxslt.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of post-failure recompilation in unspecified libxslt versions.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=271939
- https://code.google.com/p/chromium/issues/detail?id=271939
- oval:org.mitre.oval:def:18687
- oval:org.mitre.oval:def:18687
- https://src.chromium.org/viewvc/blink?revision=156248&view=revision
- https://src.chromium.org/viewvc/blink?revision=156248&view=revision
Modified: 2024-11-21
CVE-2013-2912
Use-after-free vulnerability in the PepperInProcessRouter::SendToHost function in content/renderer/pepper/pepper_in_process_router.cc in the Pepper Plug-in API (PPAPI) in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a resource-destruction message.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=276368
- https://code.google.com/p/chromium/issues/detail?id=276368
- oval:org.mitre.oval:def:18962
- oval:org.mitre.oval:def:18962
- https://src.chromium.org/viewvc/chrome?revision=222614&view=revision
- https://src.chromium.org/viewvc/chrome?revision=222614&view=revision
Modified: 2024-11-21
CVE-2013-2913
Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=278908
- https://code.google.com/p/chromium/issues/detail?id=278908
- oval:org.mitre.oval:def:18843
- oval:org.mitre.oval:def:18843
- https://src.chromium.org/viewvc/blink?revision=157914&view=revision
- https://src.chromium.org/viewvc/blink?revision=157914&view=revision
Modified: 2024-11-21
CVE-2013-2915
Google Chrome before 30.0.1599.66 preserves pending NavigationEntry objects in certain invalid circumstances, which allows remote attackers to spoof the address bar via a URL with a malformed scheme, as demonstrated by a nonexistent:12121 URL.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=280512
- https://code.google.com/p/chromium/issues/detail?id=280512
- oval:org.mitre.oval:def:18319
- oval:org.mitre.oval:def:18319
- https://src.chromium.org/viewvc/chrome?revision=222146&view=revision
- https://src.chromium.org/viewvc/chrome?revision=222146&view=revision
Modified: 2024-11-21
CVE-2013-2916
Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code, in conjunction with a delay in notifying the user of an attempted spoof.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=281256
- https://code.google.com/p/chromium/issues/detail?id=281256
- oval:org.mitre.oval:def:18968
- oval:org.mitre.oval:def:18968
- https://src.chromium.org/viewvc/blink?revision=157196&view=revision
- https://src.chromium.org/viewvc/blink?revision=157196&view=revision
Modified: 2024-11-21
CVE-2013-2917
The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=281480
- https://code.google.com/p/chromium/issues/detail?id=281480
- oval:org.mitre.oval:def:18820
- oval:org.mitre.oval:def:18820
- https://src.chromium.org/viewvc/blink?revision=157007&view=revision
- https://src.chromium.org/viewvc/blink?revision=157007&view=revision
Modified: 2024-11-21
CVE-2013-2918
Use-after-free vulnerability in the RenderBlock::collapseAnonymousBlockChild function in core/rendering/RenderBlock.cpp in the DOM implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect handling of parent-child relationships for anonymous blocks.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=282088
- https://code.google.com/p/chromium/issues/detail?id=282088
- oval:org.mitre.oval:def:18839
- oval:org.mitre.oval:def:18839
- https://src.chromium.org/viewvc/blink?revision=157392&view=revision
- https://src.chromium.org/viewvc/blink?revision=157392&view=revision
Modified: 2024-11-21
CVE-2013-2919
Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=282736
- https://code.google.com/p/chromium/issues/detail?id=282736
- oval:org.mitre.oval:def:18840
- oval:org.mitre.oval:def:18840
Modified: 2024-11-21
CVE-2013-2920
The DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via a relative URL containing a hostname, as demonstrated by a protocol-relative URL beginning with a //www.google.com/ substring.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=285742
- https://code.google.com/p/chromium/issues/detail?id=285742
- oval:org.mitre.oval:def:18451
- oval:org.mitre.oval:def:18451
- https://src.chromium.org/viewvc/chrome?revision=223735&view=revision
- https://src.chromium.org/viewvc/chrome?revision=223735&view=revision
Modified: 2024-11-21
CVE-2013-2921
Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=286414
- https://code.google.com/p/chromium/issues/detail?id=286414
- oval:org.mitre.oval:def:18389
- oval:org.mitre.oval:def:18389
- https://src.chromium.org/viewvc/blink?revision=157760&view=revision
- https://src.chromium.org/viewvc/blink?revision=157760&view=revision
Modified: 2024-11-21
CVE-2013-2922
Use-after-free vulnerability in core/html/HTMLTemplateElement.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that operates on a TEMPLATE element.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=286975
- https://code.google.com/p/chromium/issues/detail?id=286975
- oval:org.mitre.oval:def:18358
- oval:org.mitre.oval:def:18358
- https://src.chromium.org/viewvc/blink?revision=157543&view=revision
- https://src.chromium.org/viewvc/blink?revision=157543&view=revision
Modified: 2024-11-21
CVE-2013-2923
Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.66 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=237800
- https://code.google.com/p/chromium/issues/detail?id=237800
- https://code.google.com/p/chromium/issues/detail?id=246724
- https://code.google.com/p/chromium/issues/detail?id=246724
- https://code.google.com/p/chromium/issues/detail?id=254728
- https://code.google.com/p/chromium/issues/detail?id=254728
- https://code.google.com/p/chromium/issues/detail?id=257852
- https://code.google.com/p/chromium/issues/detail?id=257852
- https://code.google.com/p/chromium/issues/detail?id=260138
- https://code.google.com/p/chromium/issues/detail?id=260138
- https://code.google.com/p/chromium/issues/detail?id=264211
- https://code.google.com/p/chromium/issues/detail?id=264211
- https://code.google.com/p/chromium/issues/detail?id=265493
- https://code.google.com/p/chromium/issues/detail?id=265493
- https://code.google.com/p/chromium/issues/detail?id=265731
- https://code.google.com/p/chromium/issues/detail?id=265731
- https://code.google.com/p/chromium/issues/detail?id=266593
- https://code.google.com/p/chromium/issues/detail?id=266593
- https://code.google.com/p/chromium/issues/detail?id=267068
- https://code.google.com/p/chromium/issues/detail?id=267068
- https://code.google.com/p/chromium/issues/detail?id=269835
- https://code.google.com/p/chromium/issues/detail?id=269835
- https://code.google.com/p/chromium/issues/detail?id=274020
- https://code.google.com/p/chromium/issues/detail?id=274020
- https://code.google.com/p/chromium/issues/detail?id=276111
- https://code.google.com/p/chromium/issues/detail?id=276111
- https://code.google.com/p/chromium/issues/detail?id=277656
- https://code.google.com/p/chromium/issues/detail?id=277656
- https://code.google.com/p/chromium/issues/detail?id=278366
- https://code.google.com/p/chromium/issues/detail?id=278366
- https://code.google.com/p/chromium/issues/detail?id=279286
- https://code.google.com/p/chromium/issues/detail?id=279286
- https://code.google.com/p/chromium/issues/detail?id=284792
- https://code.google.com/p/chromium/issues/detail?id=284792
- https://code.google.com/p/chromium/issues/detail?id=285380
- https://code.google.com/p/chromium/issues/detail?id=285380
- https://code.google.com/p/chromium/issues/detail?id=288761
- https://code.google.com/p/chromium/issues/detail?id=288761
- https://code.google.com/p/chromium/issues/detail?id=288771
- https://code.google.com/p/chromium/issues/detail?id=288771
- https://code.google.com/p/chromium/issues/detail?id=289648
- https://code.google.com/p/chromium/issues/detail?id=289648
- https://code.google.com/p/chromium/issues/detail?id=293521
- https://code.google.com/p/chromium/issues/detail?id=293521
- https://code.google.com/p/chromium/issues/detail?id=294023
- https://code.google.com/p/chromium/issues/detail?id=294023
- https://code.google.com/p/chromium/issues/detail?id=294202
- https://code.google.com/p/chromium/issues/detail?id=294202
- https://code.google.com/p/chromium/issues/detail?id=294206
- https://code.google.com/p/chromium/issues/detail?id=294206
- https://code.google.com/p/chromium/issues/detail?id=299016
- https://code.google.com/p/chromium/issues/detail?id=299016
- oval:org.mitre.oval:def:18103
- oval:org.mitre.oval:def:18103
Modified: 2024-11-21
CVE-2013-2924
Use-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
- http://bugs.icu-project.org/trac/ticket/10318
- http://bugs.icu-project.org/trac/ticket/10318
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- JVN#85336306
- JVN#85336306
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- DSA-2786
- DSA-2786
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- 64758
- 64758
- https://code.google.com/p/chromium/issues/detail?id=275803
- https://code.google.com/p/chromium/issues/detail?id=275803
- oval:org.mitre.oval:def:19017
- oval:org.mitre.oval:def:19017
- https://src.chromium.org/viewvc/chrome?revision=219151&view=revision
- https://src.chromium.org/viewvc/chrome?revision=219151&view=revision
Modified: 2024-11-21
CVE-2013-2925
Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=292422
- https://code.google.com/p/chromium/issues/detail?id=292422
- oval:org.mitre.oval:def:18866
- oval:org.mitre.oval:def:18866
- https://src.chromium.org/viewvc/blink?revision=158146&view=revision
- https://src.chromium.org/viewvc/blink?revision=158146&view=revision
Modified: 2024-11-21
CVE-2013-2926
Use-after-free vulnerability in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to list elements.
- APPLE-SA-2014-04-01-1
- APPLE-SA-2014-04-01-1
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=294456
- https://code.google.com/p/chromium/issues/detail?id=294456
- oval:org.mitre.oval:def:18837
- oval:org.mitre.oval:def:18837
- https://src.chromium.org/viewvc/blink?revision=158727&view=revision
- https://src.chromium.org/viewvc/blink?revision=158727&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2927
Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements.
- APPLE-SA-2014-05-21-1
- APPLE-SA-2014-05-21-1
- APPLE-SA-2014-06-30-3
- APPLE-SA-2014-06-30-3
- APPLE-SA-2014-06-30-4
- APPLE-SA-2014-06-30-4
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6254
- http://support.apple.com/kb/HT6254
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=297478
- https://code.google.com/p/chromium/issues/detail?id=297478
- oval:org.mitre.oval:def:19155
- oval:org.mitre.oval:def:19155
- https://src.chromium.org/viewvc/blink?revision=158428&view=revision
- https://src.chromium.org/viewvc/blink?revision=158428&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2928
Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- APPLE-SA-2014-04-01-1
- APPLE-SA-2014-04-01-1
- http://crbug.com/303657
- http://crbug.com/303657
- http://crbug.com/303772
- http://crbug.com/303772
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=305790
- https://code.google.com/p/chromium/issues/detail?id=305790
- oval:org.mitre.oval:def:19065
- oval:org.mitre.oval:def:19065
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2931
Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=263255
- https://code.google.com/p/chromium/issues/detail?id=263255
- https://code.google.com/p/chromium/issues/detail?id=264574
- https://code.google.com/p/chromium/issues/detail?id=264574
- https://code.google.com/p/chromium/issues/detail?id=271235
- https://code.google.com/p/chromium/issues/detail?id=271235
- https://code.google.com/p/chromium/issues/detail?id=282738
- https://code.google.com/p/chromium/issues/detail?id=282738
- https://code.google.com/p/chromium/issues/detail?id=285578
- https://code.google.com/p/chromium/issues/detail?id=285578
- https://code.google.com/p/chromium/issues/detail?id=286368
- https://code.google.com/p/chromium/issues/detail?id=286368
- https://code.google.com/p/chromium/issues/detail?id=296276
- https://code.google.com/p/chromium/issues/detail?id=296276
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/chromium/issues/detail?id=297556
- https://code.google.com/p/chromium/issues/detail?id=297556
- https://code.google.com/p/chromium/issues/detail?id=299835
- https://code.google.com/p/chromium/issues/detail?id=299835
- https://code.google.com/p/chromium/issues/detail?id=299993
- https://code.google.com/p/chromium/issues/detail?id=299993
- https://code.google.com/p/chromium/issues/detail?id=302810
- https://code.google.com/p/chromium/issues/detail?id=302810
- https://code.google.com/p/chromium/issues/detail?id=303232
- https://code.google.com/p/chromium/issues/detail?id=303232
- https://code.google.com/p/chromium/issues/detail?id=304226
- https://code.google.com/p/chromium/issues/detail?id=304226
- https://code.google.com/p/chromium/issues/detail?id=306255
- https://code.google.com/p/chromium/issues/detail?id=306255
- https://code.google.com/p/chromium/issues/detail?id=314225
- https://code.google.com/p/chromium/issues/detail?id=314225
- https://code.google.com/p/chromium/issues/detail?id=315823
- https://code.google.com/p/chromium/issues/detail?id=315823
- oval:org.mitre.oval:def:19183
- oval:org.mitre.oval:def:19183
Modified: 2024-11-21
CVE-2013-6621
Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=268565
- https://code.google.com/p/chromium/issues/detail?id=268565
- oval:org.mitre.oval:def:19006
- oval:org.mitre.oval:def:19006
Modified: 2024-11-21
CVE-2013-6622
Use-after-free vulnerability in the HTMLMediaElement::didMoveToNewDocument function in core/html/HTMLMediaElement.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the movement of a media element between documents.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=272786
- https://code.google.com/p/chromium/issues/detail?id=272786
- oval:org.mitre.oval:def:18335
- oval:org.mitre.oval:def:18335
- https://src.chromium.org/viewvc/blink?revision=159031&view=revision
- https://src.chromium.org/viewvc/blink?revision=159031&view=revision
Modified: 2024-11-21
CVE-2013-6623
The SVG implementation in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging the use of tree order, rather than transitive dependency order, for layout.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=282925
- https://code.google.com/p/chromium/issues/detail?id=282925
- oval:org.mitre.oval:def:19311
- oval:org.mitre.oval:def:19311
- https://src.chromium.org/viewvc/blink?revision=158480&view=revision
- https://src.chromium.org/viewvc/blink?revision=158480&view=revision
Modified: 2024-11-21
CVE-2013-6624
Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=290566
- https://code.google.com/p/chromium/issues/detail?id=290566
- oval:org.mitre.oval:def:19168
- oval:org.mitre.oval:def:19168
Modified: 2024-11-21
CVE-2013-6625
Use-after-free vulnerability in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of DOM range objects in circumstances that require child node removal after a (1) mutation or (2) blur event.
- APPLE-SA-2014-04-01-1
- APPLE-SA-2014-04-01-1
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=295010
- https://code.google.com/p/chromium/issues/detail?id=295010
- oval:org.mitre.oval:def:19257
- oval:org.mitre.oval:def:19257
- https://src.chromium.org/viewvc/blink?revision=160037&view=revision
- https://src.chromium.org/viewvc/blink?revision=160037&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-6626
The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=295695
- https://code.google.com/p/chromium/issues/detail?id=295695
- oval:org.mitre.oval:def:18401
- oval:org.mitre.oval:def:18401
- https://src.chromium.org/viewvc/chrome?revision=225026&view=revision
- https://src.chromium.org/viewvc/chrome?revision=225026&view=revision
Modified: 2024-11-21
CVE-2013-6627
net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response.
- http://blog.skylined.nl/20161219001.html
- http://blog.skylined.nl/20161219001.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html
- http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html
- 20161219 CVE-2013-6627: Chrome Chrome HTTP 1xx base::StringTokenizerT<...>::QuickGetNext OOBR
- 20161219 CVE-2013-6627: Chrome Chrome HTTP 1xx base::StringTokenizerT<...>::QuickGetNext OOBR
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=299892
- https://code.google.com/p/chromium/issues/detail?id=299892
- oval:org.mitre.oval:def:19113
- oval:org.mitre.oval:def:19113
- https://src.chromium.org/viewvc/chrome?revision=226539&view=revision
- https://src.chromium.org/viewvc/chrome?revision=226539&view=revision
- 40944
- 40944
Modified: 2024-11-21
CVE-2013-6628
net/socket/ssl_client_socket_nss.cc in the TLS implementation in Google Chrome before 31.0.1650.48 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which might allow remote web servers to interfere with trust relationships by renegotiating a session.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=306959
- https://code.google.com/p/chromium/issues/detail?id=306959
- oval:org.mitre.oval:def:19108
- oval:org.mitre.oval:def:19108
- https://secure-resumption.com/
- https://secure-resumption.com/
- https://src.chromium.org/viewvc/chrome?revision=229611&view=revision
- https://src.chromium.org/viewvc/chrome?revision=229611&view=revision
Modified: 2024-11-21
CVE-2013-6629
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
- http://advisories.mageia.org/MGASA-2013-0333.html
- http://advisories.mageia.org/MGASA-2013-0333.html
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- http://bugs.ghostscript.com/show_bug.cgi?id=686980
- http://bugs.ghostscript.com/show_bug.cgi?id=686980
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- HPSBUX03091
- HPSBUX03091
- SSRT101667
- SSRT101667
- HPSBUX03092
- HPSBUX03092
- SSRT101668
- SSRT101668
- RHSA-2013:1803
- RHSA-2013:1803
- RHSA-2013:1804
- RHSA-2013:1804
- 56175
- 56175
- 58974
- 58974
- 59058
- 59058
- GLSA-201406-32
- GLSA-201406-32
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2799
- DSA-2799
- MDVSA-2013:273
- MDVSA-2013:273
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- 63676
- 63676
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- USN-2060-1
- USN-2060-1
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- RHSA-2014:0413
- RHSA-2014:0413
- RHSA-2014:0414
- RHSA-2014:0414
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629
- GLSA-201606-03
- GLSA-201606-03
- https://src.chromium.org/viewvc/chrome?revision=229729&view=revision
- https://src.chromium.org/viewvc/chrome?revision=229729&view=revision
- https://www.ibm.com/support/docview.wss?uid=swg21675973
- https://www.ibm.com/support/docview.wss?uid=swg21675973
Modified: 2024-11-21
CVE-2013-6630
The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
- http://advisories.mageia.org/MGASA-2013-0333.html
- http://advisories.mageia.org/MGASA-2013-0333.html
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git%3Ba=commit%3Bh=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8
- http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git%3Ba=commit%3Bh=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- RHSA-2013:1803
- RHSA-2013:1803
- 56175
- 56175
- DSA-2799
- DSA-2799
- MDVSA-2013:273
- MDVSA-2013:273
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- USN-2060-1
- USN-2060-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://code.google.com/p/chromium/issues/detail?id=299835
- https://code.google.com/p/chromium/issues/detail?id=299835
- GLSA-201606-03
- GLSA-201606-03
Modified: 2024-11-21
CVE-2013-6631
Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/webrtc/source/detail?r=4827
- https://code.google.com/p/webrtc/source/detail?r=4827
- https://webrtc-codereview.appspot.com/2275008
- https://webrtc-codereview.appspot.com/2275008
Modified: 2024-11-21
CVE-2013-6632
Integer overflow in Google Chrome before 31.0.1650.57 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013.
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319125
- https://code.google.com/p/chromium/issues/detail?id=319125
Modified: 2024-11-21
CVE-2013-6634
The OneClickSigninHelper::ShowInfoBarIfPossible function in browser/ui/sync/one_click_signin_helper.cc in Google Chrome before 31.0.1650.63 uses an incorrect URL during realm validation, which allows remote attackers to conduct session fixation attacks and hijack web sessions by triggering improper sync after a 302 (aka Found) HTTP status code.
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=307159
- https://code.google.com/p/chromium/issues/detail?id=307159
- https://src.chromium.org/viewvc/chrome?revision=236563&view=revision
- https://src.chromium.org/viewvc/chrome?revision=236563&view=revision
Modified: 2024-11-21
CVE-2013-6635
Use-after-free vulnerability in the editing implementation in Blink, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that triggers removal of a node during processing of the DOM tree, related to CompositeEditCommand.cpp and ReplaceSelectionCommand.cpp.
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- 56217
- 56217
- http://support.apple.com/kb/HT6145
- http://support.apple.com/kb/HT6145
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=314469
- https://code.google.com/p/chromium/issues/detail?id=314469
- https://src.chromium.org/viewvc/blink?revision=161598&view=revision
- https://src.chromium.org/viewvc/blink?revision=161598&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-6636
The FrameLoader::notifyIfInitialDocumentAccessed function in core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 31.0.1650.63, makes an incorrect check for an empty document during presentation of a modal dialog, which allows remote attackers to spoof the address bar via vectors involving the document.write method.
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=322959
- https://code.google.com/p/chromium/issues/detail?id=322959
- https://src.chromium.org/viewvc/blink?revision=162673&view=revision
- https://src.chromium.org/viewvc/blink?revision=162673&view=revision
Modified: 2024-11-21
CVE-2013-6637
Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=300892
- https://code.google.com/p/chromium/issues/detail?id=300892
- https://code.google.com/p/chromium/issues/detail?id=305904
- https://code.google.com/p/chromium/issues/detail?id=305904
- https://code.google.com/p/chromium/issues/detail?id=308988
- https://code.google.com/p/chromium/issues/detail?id=308988
- https://code.google.com/p/chromium/issues/detail?id=313435
- https://code.google.com/p/chromium/issues/detail?id=313435
- https://code.google.com/p/chromium/issues/detail?id=317999
- https://code.google.com/p/chromium/issues/detail?id=317999
- https://code.google.com/p/chromium/issues/detail?id=319722
- https://code.google.com/p/chromium/issues/detail?id=319722
- https://code.google.com/p/chromium/issues/detail?id=319835
- https://code.google.com/p/chromium/issues/detail?id=319835
- https://code.google.com/p/chromium/issues/detail?id=319860
- https://code.google.com/p/chromium/issues/detail?id=319860
- https://code.google.com/p/chromium/issues/detail?id=319914
- https://code.google.com/p/chromium/issues/detail?id=319914
- https://code.google.com/p/chromium/issues/detail?id=320313
- https://code.google.com/p/chromium/issues/detail?id=320313
- https://code.google.com/p/chromium/issues/detail?id=322554
- https://code.google.com/p/chromium/issues/detail?id=322554
- https://code.google.com/p/chromium/issues/detail?id=325501
- https://code.google.com/p/chromium/issues/detail?id=325501
Modified: 2024-11-21
CVE-2013-6638
Multiple buffer overflows in runtime.cc in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a large typed array, related to the (1) Runtime_TypedArrayInitialize and (2) Runtime_TypedArrayInitializeFromArrayLike functions.
- http://code.google.com/p/v8/source/detail?r=17800
- http://code.google.com/p/v8/source/detail?r=17800
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1962
- openSUSE-SU-2013:1962
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0092
- openSUSE-SU-2014:0092
- 56216
- 56216
- 56217
- 56217
- DSA-2811
- DSA-2811
- [v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)
- [v8-dev] 20131115 Limit the size for typed arrays to MaxSmi. (issue 73943004)
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=319722
- https://code.google.com/p/chromium/issues/detail?id=319722
Modified: 2024-11-21
CVE-2013-6639
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
- http://code.google.com/p/v8/source/detail?r=17801
- http://code.google.com/p/v8/source/detail?r=17801
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1962
- openSUSE-SU-2013:1962
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0092
- openSUSE-SU-2014:0092
- 56216
- 56216
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=319835
- https://code.google.com/p/chromium/issues/detail?id=319835
Modified: 2024-11-21
CVE-2013-6640
The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
- http://code.google.com/p/v8/source/detail?r=17801
- http://code.google.com/p/v8/source/detail?r=17801
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/12/stable-channel-update.html
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1927
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1933
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1960
- openSUSE-SU-2013:1962
- openSUSE-SU-2013:1962
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0092
- openSUSE-SU-2014:0092
- 56216
- 56216
- 56217
- 56217
- DSA-2811
- DSA-2811
- 1029442
- 1029442
- https://code.google.com/p/chromium/issues/detail?id=319860
- https://code.google.com/p/chromium/issues/detail?id=319860
Modified: 2024-11-21
CVE-2013-6641
Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree function in core/html/FormAssociatedElement.cpp in Blink, as used in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of the past names map of a FORM element.
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html
- openSUSE-SU-2014:0243
- openSUSE-SU-2014:0243
- DSA-2862
- DSA-2862
- https://chromium.googlesource.com/chromium/blink.git/+/1dfd387bd88cc0ebaef3a2302e72ac1c6101b91b
- https://chromium.googlesource.com/chromium/blink.git/+/1dfd387bd88cc0ebaef3a2302e72ac1c6101b91b
- https://code.google.com/p/chromium/issues/detail?id=326854
- https://code.google.com/p/chromium/issues/detail?id=326854
Modified: 2024-11-21
CVE-2013-6643
The OneClickSigninBubbleView::WindowClosing function in browser/ui/views/sync/one_click_signin_bubble_view.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows attackers to trigger a sync with an arbitrary Google account by leveraging improper handling of the closing of an untrusted signin confirm dialog.
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html
- openSUSE-SU-2014:0243
- openSUSE-SU-2014:0243
- DSA-2862
- DSA-2862
- https://code.google.com/p/chromium/issues/detail?id=321940
- https://code.google.com/p/chromium/issues/detail?id=321940
- https://src.chromium.org/viewvc/chrome?revision=237115&view=revision
- https://src.chromium.org/viewvc/chrome?revision=237115&view=revision
Modified: 2024-11-21
CVE-2013-6645
Use-after-free vulnerability in the OnWindowRemovingFromRootWindow function in content/browser/web_contents/web_contents_view_aura.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving certain print-preview and tab-switch actions that interact with a speech input element.
- http://code.google.com/p/chromium/issues/detail?id=320183
- http://code.google.com/p/chromium/issues/detail?id=320183
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html
- openSUSE-SU-2014:0243
- openSUSE-SU-2014:0243
- DSA-2862
- DSA-2862
- https://code.google.com/p/chromium/issues/detail?id=318791
- https://code.google.com/p/chromium/issues/detail?id=318791
- https://src.chromium.org/viewvc/chrome?revision=235302&view=revision
- https://src.chromium.org/viewvc/chrome?revision=235302&view=revision
Modified: 2024-11-21
CVE-2013-6646
Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the shutting down of a worker process.
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update.html
- openSUSE-SU-2014:0243
- openSUSE-SU-2014:0243
- DSA-2862
- DSA-2862
- https://code.google.com/p/chromium/issues/detail?id=249502
- https://code.google.com/p/chromium/issues/detail?id=249502
- https://src.chromium.org/viewvc/chrome?revision=233099&view=revision
- https://src.chromium.org/viewvc/chrome?revision=233099&view=revision
- https://src.chromium.org/viewvc/chrome?revision=233367&view=revision
- https://src.chromium.org/viewvc/chrome?revision=233367&view=revision
Modified: 2024-11-21
CVE-2013-6649
Use-after-free vulnerability in the RenderSVGImage::paint function in core/rendering/svg/RenderSVGImage.cpp in Blink, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a zero-size SVG image.
- http://crbug.com/330420
- http://crbug.com/330420
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html
- openSUSE-SU-2014:0243
- openSUSE-SU-2014:0243
- DSA-2862
- DSA-2862
- https://src.chromium.org/viewvc/blink?revision=164536&view=revision
- https://src.chromium.org/viewvc/blink?revision=164536&view=revision
Modified: 2024-11-21
CVE-2013-6650
The StoreBuffer::ExemptPopularPages function in store-buffer.cc in Google V8 before 3.22.24.16, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors that trigger incorrect handling of "popular pages."
- http://crbug.com/331444
- http://crbug.com/331444
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html
- openSUSE-SU-2014:0243
- openSUSE-SU-2014:0243
- DSA-2862
- DSA-2862
- https://code.google.com/p/v8/source/detail?r=18483
- https://code.google.com/p/v8/source/detail?r=18483
Modified: 2024-11-21
CVE-2013-6802
Google Chrome before 31.0.1650.57 allows remote attackers to bypass intended sandbox restrictions by leveraging access to a renderer process, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013, a different vulnerability than CVE-2013-6632.
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319125
- https://code.google.com/p/chromium/issues/detail?id=319125
- google-chrome-cve20136802-sec-bypass(89201)
- google-chrome-cve20136802-sec-bypass(89201)
Modified: 2024-11-21
CVE-2014-1681
Multiple unspecified vulnerabilities in Google Chrome before 32.0.1700.102 have unknown impact and attack vectors, related to 12 "security fixes [that were not] either contributed by external researchers or particularly interesting."
Modified: 2024-11-21
CVE-2019-15684
Kaspersky Protection extension for web browser Google Chrome prior to 30.112.62.0 was vulnerable to unauthorized access to its features remotely that could lead to removing other installed extensions.
Package python-module-psycopg2 updated to version 2.5.1-alt2 for branch c7 in task 113152.
Closed bugs
Неверный URL: в пакете
Отсутствует зависимость на python-modules-json
Closed bugs
Неверно упакован, всё в одной куче в /usr/lib
Closed bugs
Обновить версию
Package python-module-sip updated to version 4.15.3-alt1 for branch c7 in task 113152.
Closed bugs
too old
Package python-module-PyQt4 updated to version 4.10.3-alt1 for branch c7 in task 113152.
Closed bugs
too old