ALT-BU-2014-2632-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-6653
Use-after-free vulnerability in the web contents implementation in Google Chrome before 33.0.1750.117 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving attempted conflicting access to the color chooser.
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- openSUSE-SU-2014:0327
- openSUSE-SU-2014:0327
- DSA-2883
- DSA-2883
- https://code.google.com/p/chromium/issues/detail?id=331790
- https://code.google.com/p/chromium/issues/detail?id=331790
- https://src.chromium.org/viewvc/chrome?revision=244710&view=revision
- https://src.chromium.org/viewvc/chrome?revision=244710&view=revision
Modified: 2024-11-21
CVE-2013-6654
The SVGAnimateElement::calculateAnimatedValue function in core/svg/SVGAnimateElement.cpp in Blink, as used in Google Chrome before 33.0.1750.117, does not properly handle unexpected data types, which allows remote attackers to cause a denial of service (incorrect cast) or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- openSUSE-SU-2014:0327
- openSUSE-SU-2014:0327
- DSA-2883
- DSA-2883
- https://code.google.com/p/chromium/issues/detail?id=333176
- https://code.google.com/p/chromium/issues/detail?id=333176
- https://src.chromium.org/viewvc/blink?revision=165009&view=revision
- https://src.chromium.org/viewvc/blink?revision=165009&view=revision
Modified: 2024-11-21
CVE-2013-6655
Use-after-free vulnerability in Blink, as used in Google Chrome before 33.0.1750.117, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to improper handling of overflowchanged DOM events during interaction between JavaScript and layout.
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- openSUSE-SU-2014:0327
- openSUSE-SU-2014:0327
- DSA-2883
- DSA-2883
- https://code.google.com/p/chromium/issues/detail?id=293534
- https://code.google.com/p/chromium/issues/detail?id=293534
- https://src.chromium.org/viewvc/blink?revision=162655&view=revision
- https://src.chromium.org/viewvc/blink?revision=162655&view=revision
Modified: 2024-11-21
CVE-2013-6656
The XSSAuditor::init function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 33.0.1750.117, processes POST requests by using the body of a redirecting page instead of the body of a redirect target, which allows remote attackers to obtain sensitive information via unspecified vectors.
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- openSUSE-SU-2014:0327
- openSUSE-SU-2014:0327
- DSA-2883
- DSA-2883
- https://code.google.com/p/chromium/issues/detail?id=331725
- https://code.google.com/p/chromium/issues/detail?id=331725
- https://src.chromium.org/viewvc/blink?revision=164749&view=revision
- https://src.chromium.org/viewvc/blink?revision=164749&view=revision
Modified: 2024-11-21
CVE-2013-6657
core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 33.0.1750.117, inserts the about:blank URL during certain blocking of FORM elements within HTTP requests, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- openSUSE-SU-2014:0327
- openSUSE-SU-2014:0327
- DSA-2883
- DSA-2883
- https://code.google.com/p/chromium/issues/detail?id=331060
- https://code.google.com/p/chromium/issues/detail?id=331060
- https://src.chromium.org/viewvc/blink?revision=164538&view=revision
- https://src.chromium.org/viewvc/blink?revision=164538&view=revision
Modified: 2024-11-21
CVE-2013-6658
Multiple use-after-free vulnerabilities in the layout implementation in Blink, as used in Google Chrome before 33.0.1750.117, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving (1) running JavaScript code during execution of the updateWidgetPositions function or (2) making a call into a plugin during execution of the updateWidgetPositions function.
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- openSUSE-SU-2014:0327
- openSUSE-SU-2014:0327
- DSA-2883
- DSA-2883
- https://code.google.com/p/chromium/issues/detail?id=322891
- https://code.google.com/p/chromium/issues/detail?id=322891
- https://src.chromium.org/viewvc/blink?revision=165052&view=revision
- https://src.chromium.org/viewvc/blink?revision=165052&view=revision
Modified: 2024-11-21
CVE-2013-6659
The SSLClientSocketNSS::Core::OwnAuthCertHandler function in net/socket/ssl_client_socket_nss.cc in Google Chrome before 33.0.1750.117 does not prevent changes to server X.509 certificates during renegotiations, which allows remote SSL servers to trigger use of a new certificate chain, inconsistent with the user's expectations, by initiating a TLS renegotiation.
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- openSUSE-SU-2014:0327
- openSUSE-SU-2014:0327
- DSA-2883
- DSA-2883
- https://code.google.com/p/chromium/issues/detail?id=306959
- https://code.google.com/p/chromium/issues/detail?id=306959
- https://src.chromium.org/viewvc/chrome?revision=229611&view=revision
- https://src.chromium.org/viewvc/chrome?revision=229611&view=revision
Modified: 2024-11-21
CVE-2013-6660
The drag-and-drop implementation in Google Chrome before 33.0.1750.117 does not properly restrict the information in WebDropData data structures, which allows remote attackers to discover full pathnames via a crafted web site.
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- openSUSE-SU-2014:0327
- openSUSE-SU-2014:0327
- DSA-2883
- DSA-2883
- https://code.google.com/p/chromium/issues/detail?id=332579
- https://code.google.com/p/chromium/issues/detail?id=332579
- https://src.chromium.org/viewvc/chrome?revision=244538&view=revision
- https://src.chromium.org/viewvc/chrome?revision=244538&view=revision
Modified: 2024-11-21
CVE-2013-6661
Multiple unspecified vulnerabilities in Google Chrome before 33.0.1750.117 allow attackers to bypass the sandbox protection mechanism after obtaining renderer access, or have other impact, via unknown vectors.
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2014/02/stable-channel-update_20.html
- openSUSE-SU-2014:0327
- openSUSE-SU-2014:0327
- DSA-2883
- DSA-2883
- https://code.google.com/p/chromium/issues/detail?id=294687
- https://code.google.com/p/chromium/issues/detail?id=294687
- https://code.google.com/p/chromium/issues/detail?id=312016
- https://code.google.com/p/chromium/issues/detail?id=312016
- https://code.google.com/p/chromium/issues/detail?id=313005
- https://code.google.com/p/chromium/issues/detail?id=313005
- https://code.google.com/p/chromium/issues/detail?id=314088
- https://code.google.com/p/chromium/issues/detail?id=314088
- https://code.google.com/p/chromium/issues/detail?id=324812
- https://code.google.com/p/chromium/issues/detail?id=324812
- https://code.google.com/p/chromium/issues/detail?id=326860
- https://code.google.com/p/chromium/issues/detail?id=326860
- https://code.google.com/p/chromium/issues/detail?id=328620
- https://code.google.com/p/chromium/issues/detail?id=328620
- https://code.google.com/p/chromium/issues/detail?id=329651
- https://code.google.com/p/chromium/issues/detail?id=329651
- https://code.google.com/p/chromium/issues/detail?id=330222
- https://code.google.com/p/chromium/issues/detail?id=330222
- https://code.google.com/p/chromium/issues/detail?id=330750
- https://code.google.com/p/chromium/issues/detail?id=330750
- https://code.google.com/p/chromium/issues/detail?id=332957
- https://code.google.com/p/chromium/issues/detail?id=332957
- https://code.google.com/p/chromium/issues/detail?id=333885
- https://code.google.com/p/chromium/issues/detail?id=333885
- https://code.google.com/p/chromium/issues/detail?id=334274
- https://code.google.com/p/chromium/issues/detail?id=334274
- https://code.google.com/p/chromium/issues/detail?id=338464
- https://code.google.com/p/chromium/issues/detail?id=338464
- https://code.google.com/p/chromium/issues/detail?id=338532
- https://code.google.com/p/chromium/issues/detail?id=338532
- https://code.google.com/p/chromium/issues/detail?id=338561
- https://code.google.com/p/chromium/issues/detail?id=338561
- https://code.google.com/p/chromium/issues/detail?id=339337
- https://code.google.com/p/chromium/issues/detail?id=339337
- https://code.google.com/p/chromium/issues/detail?id=341220
- https://code.google.com/p/chromium/issues/detail?id=341220
- https://code.google.com/p/chromium/issues/detail?id=344876
- https://code.google.com/p/chromium/issues/detail?id=344876
Modified: 2024-11-21
CVE-2013-6663
Use-after-free vulnerability in the SVGImage::setContainerSize function in core/svg/graphics/SVGImage.cpp in the SVG implementation in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the resizing of a view.
- APPLE-SA-2014-09-17-1
- APPLE-SA-2014-09-17-1
- APPLE-SA-2014-09-17-2
- APPLE-SA-2014-09-17-2
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- 61306
- 61306
- 61318
- 61318
- http://support.apple.com/kb/HT6440
- http://support.apple.com/kb/HT6440
- http://support.apple.com/kb/HT6441
- http://support.apple.com/kb/HT6441
- http://support.apple.com/kb/HT6442
- http://support.apple.com/kb/HT6442
- DSA-2883
- DSA-2883
- 65930
- 65930
- https://code.google.com/p/chromium/issues/detail?id=344492
- https://code.google.com/p/chromium/issues/detail?id=344492
- https://src.chromium.org/viewvc/blink?revision=168152&view=revision
- https://src.chromium.org/viewvc/blink?revision=168152&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-6664
Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree function in core/html/FormAssociatedElement.cpp in Blink, as used in Google Chrome before 33.0.1750.146, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving FORM elements, as demonstrated by use of the speech-recognition feature.
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- DSA-2883
- DSA-2883
- 65930
- 65930
- https://code.google.com/p/chromium/issues/detail?id=326854
- https://code.google.com/p/chromium/issues/detail?id=326854
- https://src.chromium.org/viewvc/blink?revision=163825&view=revision
- https://src.chromium.org/viewvc/blink?revision=163825&view=revision
Modified: 2024-11-21
CVE-2013-6665
Heap-based buffer overflow in the ResourceProvider::InitializeSoftware function in cc/resources/resource_provider.cc in Google Chrome before 33.0.1750.146 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large texture size that triggers improper memory allocation in the software renderer.
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- DSA-2883
- DSA-2883
- 65930
- 65930
- https://code.google.com/p/chromium/issues/detail?id=337882
- https://code.google.com/p/chromium/issues/detail?id=337882
- https://src.chromium.org/viewvc/chrome?revision=250870&view=revision
- https://src.chromium.org/viewvc/chrome?revision=250870&view=revision
Modified: 2024-11-21
CVE-2013-6666
The PepperFlashRendererHost::OnNavigate function in renderer/pepper/pepper_flash_renderer_host.cc in Google Chrome before 33.0.1750.146 does not verify that all headers are Cross-Origin Resource Sharing (CORS) simple headers before proceeding with a PPB_Flash.Navigate operation, which might allow remote attackers to bypass intended CORS restrictions via an inappropriate header.
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- DSA-2883
- DSA-2883
- 65930
- 65930
- https://code.google.com/p/chromium/issues/detail?id=332023
- https://code.google.com/p/chromium/issues/detail?id=332023
- https://src.chromium.org/viewvc/chrome?revision=249114&view=revision
- https://src.chromium.org/viewvc/chrome?revision=249114&view=revision
Modified: 2024-11-21
CVE-2013-6667
Multiple unspecified vulnerabilities in Google Chrome before 33.0.1750.146 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- DSA-2883
- DSA-2883
- 65930
- 65930
- https://code.google.com/p/chromium/issues/detail?id=329006
- https://code.google.com/p/chromium/issues/detail?id=329006
- https://code.google.com/p/chromium/issues/detail?id=332947
- https://code.google.com/p/chromium/issues/detail?id=332947
- https://code.google.com/p/chromium/issues/detail?id=333279
- https://code.google.com/p/chromium/issues/detail?id=333279
- https://code.google.com/p/chromium/issues/detail?id=333280
- https://code.google.com/p/chromium/issues/detail?id=333280
- https://code.google.com/p/chromium/issues/detail?id=339667
- https://code.google.com/p/chromium/issues/detail?id=339667
- https://code.google.com/p/chromium/issues/detail?id=341060
- https://code.google.com/p/chromium/issues/detail?id=341060
- https://code.google.com/p/chromium/issues/detail?id=341063
- https://code.google.com/p/chromium/issues/detail?id=341063
- https://code.google.com/p/chromium/issues/detail?id=341068
- https://code.google.com/p/chromium/issues/detail?id=341068
- https://code.google.com/p/chromium/issues/detail?id=343265
- https://code.google.com/p/chromium/issues/detail?id=343265
- https://code.google.com/p/chromium/issues/detail?id=343964
- https://code.google.com/p/chromium/issues/detail?id=343964
- https://code.google.com/p/chromium/issues/detail?id=344186
- https://code.google.com/p/chromium/issues/detail?id=344186
- https://code.google.com/p/chromium/issues/detail?id=344887
- https://code.google.com/p/chromium/issues/detail?id=344887
- https://code.google.com/p/chromium/issues/detail?id=345959
- https://code.google.com/p/chromium/issues/detail?id=345959
- https://code.google.com/p/chromium/issues/detail?id=347302
- https://code.google.com/p/chromium/issues/detail?id=347302
- https://code.google.com/p/chromium/issues/detail?id=347909
- https://code.google.com/p/chromium/issues/detail?id=347909
- https://code.google.com/p/chromium/issues/detail?id=348175
- https://code.google.com/p/chromium/issues/detail?id=348175
Modified: 2024-11-21
CVE-2013-6668
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://advisories.mageia.org/MGASA-2014-0516.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html
- 61184
- 61184
- DSA-2883
- DSA-2883
- MDVSA-2015:142
- MDVSA-2015:142
- 65930
- 65930
- http://www-01.ibm.com/support/docview.wss?uid=swg21683389
- http://www-01.ibm.com/support/docview.wss?uid=swg21683389
- https://code.google.com/p/chromium/issues/detail?id=343964
- https://code.google.com/p/chromium/issues/detail?id=343964
- https://code.google.com/p/chromium/issues/detail?id=344186
- https://code.google.com/p/chromium/issues/detail?id=344186
- https://code.google.com/p/chromium/issues/detail?id=347909
- https://code.google.com/p/chromium/issues/detail?id=347909
- https://code.google.com/p/v8/source/detail?r=19475
- https://code.google.com/p/v8/source/detail?r=19475
- https://code.google.com/p/v8/source/detail?r=19553
- https://code.google.com/p/v8/source/detail?r=19553
- https://code.google.com/p/v8/source/detail?r=19599
- https://code.google.com/p/v8/source/detail?r=19599
Modified: 2024-11-21
CVE-2014-1700
Use-after-free vulnerability in modules/speech/SpeechSynthesis.cpp in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of a certain utterance data structure.
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- openSUSE-SU-2014:0501
- openSUSE-SU-2014:0501
- GLSA-201408-16
- GLSA-201408-16
- DSA-2883
- DSA-2883
- 1029914
- 1029914
- https://code.google.com/p/chromium/issues/detail?id=344881
- https://code.google.com/p/chromium/issues/detail?id=344881
- https://src.chromium.org/viewvc/blink?revision=168171&view=revision
- https://src.chromium.org/viewvc/blink?revision=168171&view=revision
Modified: 2024-11-21
CVE-2014-1701
The GenerateFunction function in bindings/scripts/code_generator_v8.pm in Blink, as used in Google Chrome before 33.0.1750.149, does not implement a certain cross-origin restriction for the EventTarget::dispatchEvent function, which allows remote attackers to conduct Universal XSS (UXSS) attacks via vectors involving events.
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- openSUSE-SU-2014:0501
- openSUSE-SU-2014:0501
- GLSA-201408-16
- GLSA-201408-16
- DSA-2883
- DSA-2883
- 1029914
- 1029914
- https://code.google.com/p/chromium/issues/detail?id=342618
- https://code.google.com/p/chromium/issues/detail?id=342618
- https://src.chromium.org/viewvc/blink?revision=166999&view=revision
- https://src.chromium.org/viewvc/blink?revision=166999&view=revision
Modified: 2024-11-21
CVE-2014-1702
Use-after-free vulnerability in the DatabaseThread::cleanupDatabaseThread function in modules/webdatabase/DatabaseThread.cpp in the web database implementation in Blink, as used in Google Chrome before 33.0.1750.149, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of scheduled tasks during shutdown of a thread.
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- openSUSE-SU-2014:0501
- openSUSE-SU-2014:0501
- GLSA-201408-16
- GLSA-201408-16
- DSA-2883
- DSA-2883
- 1029914
- 1029914
- https://code.google.com/p/chromium/issues/detail?id=333058
- https://code.google.com/p/chromium/issues/detail?id=333058
- https://src.chromium.org/viewvc/blink?revision=168059&view=revision
- https://src.chromium.org/viewvc/blink?revision=168059&view=revision
Modified: 2024-11-21
CVE-2014-1703
Use-after-free vulnerability in the WebSocketDispatcherHost::SendOrDrop function in content/browser/renderer_host/websocket_dispatcher_host.cc in the Web Sockets implementation in Google Chrome before 33.0.1750.149 might allow remote attackers to bypass the sandbox protection mechanism by leveraging an incorrect deletion in a certain failure case.
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- openSUSE-SU-2014:0501
- openSUSE-SU-2014:0501
- GLSA-201408-16
- GLSA-201408-16
- DSA-2883
- DSA-2883
- 1029914
- 1029914
- https://code.google.com/p/chromium/issues/detail?id=338354
- https://code.google.com/p/chromium/issues/detail?id=338354
- https://src.chromium.org/viewvc/chrome?revision=247627&view=revision
- https://src.chromium.org/viewvc/chrome?revision=247627&view=revision
Modified: 2024-11-21
CVE-2014-1704
Multiple unspecified vulnerabilities in Google V8 before 3.23.17.18, as used in Google Chrome before 33.0.1750.149, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- http://googlechromereleases.blogspot.com/2014/03/stable-channel-update_11.html
- openSUSE-SU-2014:0501
- openSUSE-SU-2014:0501
- GLSA-201408-16
- GLSA-201408-16
- DSA-2883
- DSA-2883
- 1029914
- 1029914
- https://code.google.com/p/chromium/issues/detail?id=328202
- https://code.google.com/p/chromium/issues/detail?id=328202
- https://code.google.com/p/chromium/issues/detail?id=345715
- https://code.google.com/p/chromium/issues/detail?id=345715
- https://code.google.com/p/chromium/issues/detail?id=349079
- https://code.google.com/p/chromium/issues/detail?id=349079
- https://code.google.com/p/v8/source/detail?r=18564
- https://code.google.com/p/v8/source/detail?r=18564
- https://code.google.com/p/v8/source/detail?r=19614
- https://code.google.com/p/v8/source/detail?r=19614
- https://code.google.com/p/v8/source/detail?r=19668
- https://code.google.com/p/v8/source/detail?r=19668
Package adobe-flash-player updated to version 11-alt27 for branch sisyphus in task 116324.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-0503
Adobe Flash Player before 11.7.700.272 and 11.8.x through 12.0.x before 12.0.0.77 on Windows and OS X, and before 11.2.202.346 on Linux, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
Modified: 2024-11-21
CVE-2014-0504
Adobe Flash Player before 11.7.700.272 and 11.8.x through 12.0.x before 12.0.0.77 on Windows and OS X, and before 11.2.202.346 on Linux, allows attackers to read the clipboard via unspecified vectors.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-2242
includes/upload/UploadBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 does not prevent use of invalid namespaces in SVG files, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an SVG upload, as demonstrated by use of a W3C XHTML namespace in conjunction with an IFRAME element.
- [mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12
- [mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12
- [oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- [oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- [oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- [oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- 65910
- 65910
- https://bugzilla.redhat.com/show_bug.cgi?id=1071135
- https://bugzilla.redhat.com/show_bug.cgi?id=1071135
- https://bugzilla.wikimedia.org/show_bug.cgi?id=60771
- https://bugzilla.wikimedia.org/show_bug.cgi?id=60771
- https://gerrit.wikimedia.org/r/#/q/7d923a6b53f7fbcb0cbc3a19797d741bf6f440eb%2Cn%2Cz
- https://gerrit.wikimedia.org/r/#/q/7d923a6b53f7fbcb0cbc3a19797d741bf6f440eb%2Cn%2Cz
Modified: 2024-11-21
CVE-2014-2243
includes/User.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 terminates validation of a user token upon encountering the first incorrect character, which makes it easier for remote attackers to obtain access via a brute-force attack that relies on timing differences in responses to incorrect token guesses.
- [mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12
- [mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12
- [oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- [oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- [oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- [oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- https://bugzilla.redhat.com/show_bug.cgi?id=1071136
- https://bugzilla.redhat.com/show_bug.cgi?id=1071136
- https://bugzilla.wikimedia.org/show_bug.cgi?id=61346
- https://bugzilla.wikimedia.org/show_bug.cgi?id=61346
- https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f%2Cn%2Cz
- https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f%2Cn%2Cz
Modified: 2024-11-21
CVE-2014-2244
Cross-site scripting (XSS) vulnerability in the formatHTML function in includes/api/ApiFormatBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 allows remote attackers to inject arbitrary web script or HTML via a crafted string located after http:// in the text parameter to api.php.
- [mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12
- [mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12
- [oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- [oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- [oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- [oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release
- 65906
- 65906
- https://bugzilla.redhat.com/show_bug.cgi?id=1071139
- https://bugzilla.redhat.com/show_bug.cgi?id=1071139
- https://bugzilla.wikimedia.org/show_bug.cgi?id=61362
- https://bugzilla.wikimedia.org/show_bug.cgi?id=61362
- https://gerrit.wikimedia.org/r/#/q/Idf985e4e69c2f11778a8a90503914678441cb3fb%2Cn%2Cz
- https://gerrit.wikimedia.org/r/#/q/Idf985e4e69c2f11778a8a90503914678441cb3fb%2Cn%2Cz