ALT-BU-2015-2270-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2015-09975
Уязвимость интерфейса File System API браузера Google Chrome, позволяющая удаленному нарушителю обойти защитный механизм SafeBrowsing
BDU:2016-01657
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-01658
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-01659
Уязвимость библиотеки International Components for Unicode, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-01181
Уязвимость службы обработки регулярных выражений ICU браузера Google Chrome и библиотеки International Components for Unicode, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2014-7923
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression.
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://bugs.icu-project.org/trac/ticket/11370
- http://bugs.icu-project.org/trac/ticket/11370
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c
- https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c
- https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb
- https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb
- https://code.google.com/p/chromium/issues/detail?id=430353
- https://code.google.com/p/chromium/issues/detail?id=430353
- https://codereview.chromium.org/726973003
- https://codereview.chromium.org/726973003
- GLSA-201503-06
- GLSA-201503-06
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Modified: 2024-11-21
CVE-2014-7924
Use-after-free vulnerability in the IndexedDB implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering duplicate BLOB references, related to content/browser/indexed_db/indexed_db_callbacks.cc and content/browser/indexed_db/indexed_db_dispatcher_host.cc.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=435880
- https://code.google.com/p/chromium/issues/detail?id=435880
- https://codereview.chromium.org/774593004
- https://codereview.chromium.org/774593004
Modified: 2024-11-21
CVE-2014-7925
Use-after-free vulnerability in the WebAudio implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an audio-rendering thread in which AudioNode data is improperly maintained.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=434136
- https://code.google.com/p/chromium/issues/detail?id=434136
- https://codereview.chromium.org/802593004
- https://codereview.chromium.org/802593004
- https://src.chromium.org/viewvc/blink?revision=186482&view=revision
- https://src.chromium.org/viewvc/blink?revision=186482&view=revision
- https://src.chromium.org/viewvc/blink?revision=186914&view=revision
- https://src.chromium.org/viewvc/blink?revision=186914&view=revision
Modified: 2024-11-21
CVE-2014-7926
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier.
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://bugs.icu-project.org/trac/ticket/11369
- http://bugs.icu-project.org/trac/ticket/11369
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c
- https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c
- https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb
- https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb
- https://code.google.com/p/chromium/issues/detail?id=422824
- https://code.google.com/p/chromium/issues/detail?id=422824
- https://codereview.chromium.org/726973003
- https://codereview.chromium.org/726973003
- GLSA-201503-06
- GLSA-201503-06
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Modified: 2024-11-21
CVE-2014-7927
The SimplifiedLowering::DoLoadBuffer function in compiler/simplified-lowering.cc in Google V8, as used in Google Chrome before 40.0.2214.91, does not properly choose an integer data type, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=444695
- https://code.google.com/p/chromium/issues/detail?id=444695
- https://codereview.chromium.org/824843002
- https://codereview.chromium.org/824843002
Modified: 2024-11-21
CVE-2014-7928
hydrogen.cc in Google V8, as used Google Chrome before 40.0.2214.91, does not properly handle arrays with holes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code that triggers an array copy.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=435073
- https://code.google.com/p/chromium/issues/detail?id=435073
- https://codereview.chromium.org/737383002
- https://codereview.chromium.org/737383002
Modified: 2024-11-21
CVE-2014-7929
Use-after-free vulnerability in the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving movement of a SCRIPT element across documents.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=443115
- https://code.google.com/p/chromium/issues/detail?id=443115
- https://src.chromium.org/viewvc/blink?revision=187458&view=revision
- https://src.chromium.org/viewvc/blink?revision=187458&view=revision
Modified: 2024-11-21
CVE-2014-7930
Use-after-free vulnerability in core/events/TreeScopeEventContext.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper maintenance of TreeScope data.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=442806
- https://code.google.com/p/chromium/issues/detail?id=442806
- https://src.chromium.org/viewvc/blink?revision=187435&view=revision
- https://src.chromium.org/viewvc/blink?revision=187435&view=revision
Modified: 2024-11-21
CVE-2014-7931
factory.cc in Google V8, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code that triggers improper maintenance of backing-store pointers.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=442710
- https://code.google.com/p/chromium/issues/detail?id=442710
- https://codereview.chromium.org/813023002
- https://codereview.chromium.org/813023002
Modified: 2024-11-21
CVE-2014-7932
Use-after-free vulnerability in the Element::detach function in core/dom/Element.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving pending updates of detached elements.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=429666
- https://code.google.com/p/chromium/issues/detail?id=429666
- https://src.chromium.org/viewvc/blink?revision=185670&view=revision
- https://src.chromium.org/viewvc/blink?revision=185670&view=revision
Modified: 2024-11-21
CVE-2014-7933
Use-after-free vulnerability in the matroska_read_seek function in libavformat/matroskadec.c in FFmpeg before 2.5.1, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Matroska file that triggers improper maintenance of tracks data.
- http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=490a3ebf36821b81f73e34ad3f554cb523dd2682
- http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=490a3ebf36821b81f73e34ad3f554cb523dd2682
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=427266
- https://code.google.com/p/chromium/issues/detail?id=427266
Modified: 2024-11-21
CVE-2014-7934
Use-after-free vulnerability in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to unexpected absence of document data structures.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=427249
- https://code.google.com/p/chromium/issues/detail?id=427249
- https://src.chromium.org/viewvc/blink?revision=185504&view=revision
- https://src.chromium.org/viewvc/blink?revision=185504&view=revision
- https://src.chromium.org/viewvc/blink?revision=185598&view=revision
- https://src.chromium.org/viewvc/blink?revision=185598&view=revision
Modified: 2024-11-21
CVE-2014-7935
Use-after-free vulnerability in browser/speech/tts_message_filter.cc in the Speech implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving utterances from a closed tab.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- https://code.google.com/p/chromium/issues/detail?id=402957
- https://code.google.com/p/chromium/issues/detail?id=402957
- https://codereview.chromium.org/692203002
- https://codereview.chromium.org/692203002
Modified: 2024-11-21
CVE-2014-7936
Use-after-free vulnerability in the ZoomBubbleView::Close function in browser/ui/views/location_bar/zoom_bubble_view.cc in the Views implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that triggers improper maintenance of a zoom bubble.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- https://code.google.com/p/chromium/issues/detail?id=428561
- https://code.google.com/p/chromium/issues/detail?id=428561
- https://codereview.chromium.org/752153005
- https://codereview.chromium.org/752153005
Modified: 2024-11-21
CVE-2014-7937
Multiple off-by-one errors in libavcodec/vorbisdec.c in FFmpeg before 2.4.2, as used in Google Chrome before 40.0.2214.91, allow remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Vorbis I data.
- http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=8c50704ebf1777bee76772c4835d9760b3721057
- http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=8c50704ebf1777bee76772c4835d9760b3721057
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://chromium.googlesource.com/chromium/third_party/ffmpeg/+/d4608b7c83f56b17f14fdd94990341f62bb52f92
- https://chromium.googlesource.com/chromium/third_party/ffmpeg/+/d4608b7c83f56b17f14fdd94990341f62bb52f92
- https://code.google.com/p/chromium/issues/detail?id=419060
- https://code.google.com/p/chromium/issues/detail?id=419060
- GLSA-201603-06
- GLSA-201603-06
Modified: 2024-11-21
CVE-2014-7938
The Fonts implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=416323
- https://code.google.com/p/chromium/issues/detail?id=416323
Modified: 2024-11-21
CVE-2014-7939
Google Chrome before 40.0.2214.91, when the Harmony proxy in Google V8 is enabled, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code with Proxy.create and console.log calls, related to HTTP responses that lack an "X-Content-Type-Options: nosniff" header.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- https://code.google.com/p/chromium/issues/detail?id=399951
- https://code.google.com/p/chromium/issues/detail?id=399951
Modified: 2024-11-21
CVE-2014-7940
The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126, as used in Google Chrome before 40.0.2214.91, does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence.
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075
- https://chromium.googlesource.com/chromium/deps/icu/+/866ff696e9022a6000afbab516fba62cfa306075
- https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8
- https://chromium.googlesource.com/chromium/src.git/+/87feb77547781a22b31c423bc0d57b7dca32d5b8
- https://code.google.com/p/chromium/issues/detail?id=433866
- https://code.google.com/p/chromium/issues/detail?id=433866
- GLSA-201503-06
- GLSA-201503-06
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Modified: 2024-11-21
CVE-2014-7941
The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- https://code.google.com/p/chromium/issues/detail?id=428557
- https://code.google.com/p/chromium/issues/detail?id=428557
- https://codereview.chromium.org/697863002
- https://codereview.chromium.org/697863002
Modified: 2024-11-21
CVE-2014-7942
The Fonts implementation in Google Chrome before 40.0.2214.91 does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=426762
- https://code.google.com/p/chromium/issues/detail?id=426762
Modified: 2024-11-21
CVE-2014-7943
Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=422492
- https://code.google.com/p/chromium/issues/detail?id=422492
Modified: 2024-11-21
CVE-2014-7944
The sycc422_to_rgb function in fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 40.0.2214.91, does not properly handle odd values of image width, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- https://code.google.com/p/chromium/issues/detail?id=418881
- https://code.google.com/p/chromium/issues/detail?id=418881
- https://pdfium.googlesource.com/pdfium/+/6cf012af4954807255ce7cdb5b92a20f74d34e6d
- https://pdfium.googlesource.com/pdfium/+/6cf012af4954807255ce7cdb5b92a20f74d34e6d
Modified: 2024-11-21
CVE-2014-7945
OpenJPEG before r2908, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, and t2.c.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- https://code.google.com/p/chromium/issues/detail?id=414310
- https://code.google.com/p/chromium/issues/detail?id=414310
- https://pdfium.googlesource.com/pdfium/+/767aebbef641a89498deebc29369a078207b4dcc
- https://pdfium.googlesource.com/pdfium/+/767aebbef641a89498deebc29369a078207b4dcc
Modified: 2024-11-21
CVE-2014-7946
The RenderTable::simplifiedNormalFlowLayout function in core/rendering/RenderTable.cpp in Blink, as used in Google Chrome before 40.0.2214.91, skips captions during table layout in certain situations, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors related to the Fonts implementation.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=414109
- https://code.google.com/p/chromium/issues/detail?id=414109
- https://src.chromium.org/viewvc/blink?revision=187509&view=revision
- https://src.chromium.org/viewvc/blink?revision=187509&view=revision
Modified: 2024-11-21
CVE-2014-7947
OpenJPEG before r2944, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, pi.c, t1.c, t2.c, and tcd.c.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- https://code.google.com/p/chromium/issues/detail?id=430566
- https://code.google.com/p/chromium/issues/detail?id=430566
- https://pdfium.googlesource.com/pdfium/+/66d6538c0a97cff550cafdfeaebe8a3f0efbad89
- https://pdfium.googlesource.com/pdfium/+/66d6538c0a97cff550cafdfeaebe8a3f0efbad89
Modified: 2024-11-21
CVE-2014-7948
The AppCacheUpdateJob::URLFetcher::OnResponseStarted function in content/browser/appcache/appcache_update_job.cc in Google Chrome before 40.0.2214.91 proceeds with AppCache caching for SSL sessions even if there is an X.509 certificate error, which allows man-in-the-middle attackers to spoof HTML5 application content via a crafted certificate.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- 62665
- 62665
- GLSA-201502-13
- GLSA-201502-13
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=414026
- https://code.google.com/p/chromium/issues/detail?id=414026
- https://codereview.chromium.org/579593003
- https://codereview.chromium.org/579593003
- https://codereview.chromium.org/645123003
- https://codereview.chromium.org/645123003
- https://codereview.chromium.org/725573004
- https://codereview.chromium.org/725573004
Modified: 2024-11-21
CVE-2014-9646
Unquoted Windows search path vulnerability in the GoogleChromeDistribution::DoPostUninstallOperations function in installer/util/google_chrome_distribution.cc in the uninstall-survey feature in Google Chrome before 40.0.2214.91 allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% directory, as demonstrated by program.exe, a different vulnerability than CVE-2015-1205.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- GLSA-201502-13
- GLSA-201502-13
- https://code.google.com/p/chromium/issues/detail?id=434964
- https://code.google.com/p/chromium/issues/detail?id=434964
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://codereview.chromium.org/741993002
- https://codereview.chromium.org/741993002
Modified: 2024-11-21
CVE-2014-9647
Use-after-free vulnerability in PDFium, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to fpdfsdk/src/fpdfview.cpp and fpdfsdk/src/fsdk_mgr.cpp, a different vulnerability than CVE-2015-1205.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- GLSA-201502-13
- GLSA-201502-13
- https://code.google.com/p/chromium/issues/detail?id=410326
- https://code.google.com/p/chromium/issues/detail?id=410326
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://pdfium.googlesource.com/pdfium/+/facd0157ce975158da1659fb58a16c1308bd553b
- https://pdfium.googlesource.com/pdfium/+/facd0157ce975158da1659fb58a16c1308bd553b
Modified: 2024-11-21
CVE-2014-9648
components/navigation_interception/intercept_navigation_resource_throttle.cc in Google Chrome before 40.0.2214.91 on Android does not properly restrict use of intent: URLs to open an application after navigation to a web site, which allows remote attackers to cause a denial of service (loss of browser access to that site) via crafted JavaScript code, as demonstrated by pandora.com and the Pandora application, a different vulnerability than CVE-2015-1205.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- GLSA-201502-13
- GLSA-201502-13
- https://code.google.com/p/chromium/issues/detail?id=331571
- https://code.google.com/p/chromium/issues/detail?id=331571
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://code.google.com/p/chromium/issues/detail?id=449894
Modified: 2024-11-21
CVE-2014-9654
The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923.
- http://bugs.icu-project.org/trac/changeset/36801
- http://bugs.icu-project.org/trac/changeset/36801
- http://bugs.icu-project.org/trac/ticket/11371
- http://bugs.icu-project.org/trac/ticket/11371
- [oss-security] 20150205 Re: CVE request - ICU
- [oss-security] 20150205 Re: CVE request - ICU
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 1035410
- 1035410
- https://chromium.googlesource.com/chromium/deps/icu/+/dd727641e190d60e4593bcb3a35c7f51eb4925c5
- https://chromium.googlesource.com/chromium/deps/icu/+/dd727641e190d60e4593bcb3a35c7f51eb4925c5
- https://code.google.com/p/chromium/issues/detail?id=432209
- https://code.google.com/p/chromium/issues/detail?id=432209
- GLSA-201503-06
- GLSA-201503-06
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Modified: 2024-11-21
CVE-2015-1205
Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.91 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- APPLE-SA-2015-09-16-1
- APPLE-SA-2015-09-16-1
- APPLE-SA-2015-09-16-3
- APPLE-SA-2015-09-16-3
- openSUSE-SU-2015:0441
- openSUSE-SU-2015:0441
- 62383
- 62383
- 62575
- 62575
- GLSA-201502-13
- GLSA-201502-13
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72288
- 72288
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- https://code.google.com/p/chromium/issues/detail?id=327070
- https://code.google.com/p/chromium/issues/detail?id=327070
- https://code.google.com/p/chromium/issues/detail?id=334448
- https://code.google.com/p/chromium/issues/detail?id=334448
- https://code.google.com/p/chromium/issues/detail?id=410030
- https://code.google.com/p/chromium/issues/detail?id=410030
- https://code.google.com/p/chromium/issues/detail?id=411026
- https://code.google.com/p/chromium/issues/detail?id=411026
- https://code.google.com/p/chromium/issues/detail?id=411156
- https://code.google.com/p/chromium/issues/detail?id=411156
- https://code.google.com/p/chromium/issues/detail?id=413530
- https://code.google.com/p/chromium/issues/detail?id=413530
- https://code.google.com/p/chromium/issues/detail?id=422765
- https://code.google.com/p/chromium/issues/detail?id=422765
- https://code.google.com/p/chromium/issues/detail?id=423899
- https://code.google.com/p/chromium/issues/detail?id=423899
- https://code.google.com/p/chromium/issues/detail?id=425040
- https://code.google.com/p/chromium/issues/detail?id=425040
- https://code.google.com/p/chromium/issues/detail?id=425151
- https://code.google.com/p/chromium/issues/detail?id=425151
- https://code.google.com/p/chromium/issues/detail?id=428828
- https://code.google.com/p/chromium/issues/detail?id=428828
- https://code.google.com/p/chromium/issues/detail?id=429134
- https://code.google.com/p/chromium/issues/detail?id=429134
- https://code.google.com/p/chromium/issues/detail?id=429139
- https://code.google.com/p/chromium/issues/detail?id=429139
- https://code.google.com/p/chromium/issues/detail?id=431187
- https://code.google.com/p/chromium/issues/detail?id=431187
- https://code.google.com/p/chromium/issues/detail?id=431603
- https://code.google.com/p/chromium/issues/detail?id=431603
- https://code.google.com/p/chromium/issues/detail?id=432209
- https://code.google.com/p/chromium/issues/detail?id=432209
- https://code.google.com/p/chromium/issues/detail?id=434723
- https://code.google.com/p/chromium/issues/detail?id=434723
- https://code.google.com/p/chromium/issues/detail?id=435514
- https://code.google.com/p/chromium/issues/detail?id=435514
- https://code.google.com/p/chromium/issues/detail?id=435815
- https://code.google.com/p/chromium/issues/detail?id=435815
- https://code.google.com/p/chromium/issues/detail?id=437655
- https://code.google.com/p/chromium/issues/detail?id=437655
- https://code.google.com/p/chromium/issues/detail?id=438363
- https://code.google.com/p/chromium/issues/detail?id=438363
- https://code.google.com/p/chromium/issues/detail?id=439319
- https://code.google.com/p/chromium/issues/detail?id=439319
- https://code.google.com/p/chromium/issues/detail?id=440572
- https://code.google.com/p/chromium/issues/detail?id=440572
- https://code.google.com/p/chromium/issues/detail?id=440913
- https://code.google.com/p/chromium/issues/detail?id=440913
- https://code.google.com/p/chromium/issues/detail?id=441834
- https://code.google.com/p/chromium/issues/detail?id=441834
- https://code.google.com/p/chromium/issues/detail?id=443274
- https://code.google.com/p/chromium/issues/detail?id=443274
- https://code.google.com/p/chromium/issues/detail?id=443333
- https://code.google.com/p/chromium/issues/detail?id=443333
- https://code.google.com/p/chromium/issues/detail?id=446076
- https://code.google.com/p/chromium/issues/detail?id=446076
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://support.apple.com/HT205212
- https://support.apple.com/HT205212
- https://support.apple.com/HT205221
- https://support.apple.com/HT205221
Modified: 2024-11-21
CVE-2015-1248
The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.
- http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html
- http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html
- openSUSE-SU-2015:0748
- openSUSE-SU-2015:0748
- openSUSE-SU-2015:1887
- openSUSE-SU-2015:1887
- RHSA-2015:0816
- RHSA-2015:0816
- DSA-3238
- DSA-3238
- 1032209
- 1032209
- https://code.google.com/p/chromium/issues/detail?id=380663
- https://code.google.com/p/chromium/issues/detail?id=380663
- GLSA-201506-04
- GLSA-201506-04
Modified: 2024-11-21
CVE-2015-1346
Multiple unspecified vulnerabilities in Google V8 before 3.30.33.15, as used in Google Chrome before 40.0.2214.91, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- RHSA-2015:0093
- RHSA-2015:0093
- 62383
- 62383
- 62575
- 62575
- GLSA-201502-13
- GLSA-201502-13
- 1031623
- 1031623
- USN-2476-1
- USN-2476-1
- google-v8-cve20151346-code-exec(100361)
- google-v8-cve20151346-code-exec(100361)
Modified: 2024-11-21
CVE-2015-1359
Multiple off-by-one errors in fpdfapi/fpdf_font/font_int.h in PDFium, as used in Google Chrome before 40.0.2214.91, allow remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted PDF document, related to an "intra-object-overflow" issue, a different vulnerability than CVE-2015-1205.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- GLSA-201502-13
- GLSA-201502-13
- https://code.google.com/p/chromium/issues/detail?id=421196
- https://code.google.com/p/chromium/issues/detail?id=421196
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://codereview.chromium.org/656463006
- https://codereview.chromium.org/656463006
Modified: 2024-11-21
CVE-2015-1360
Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted data that is improperly handled during text drawing, related to gpu/GrBitmapTextContext.cpp and gpu/GrDistanceFieldTextContext.cpp, a different vulnerability than CVE-2015-1205.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- GLSA-201502-13
- GLSA-201502-13
- https://code.google.com/p/chromium/issues/detail?id=416289
- https://code.google.com/p/chromium/issues/detail?id=416289
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://codereview.chromium.org/636233008
- https://codereview.chromium.org/636233008
Modified: 2024-11-21
CVE-2015-1361
platform/image-decoders/ImageFrame.h in Blink, as used in Google Chrome before 40.0.2214.91, does not initialize a variable that is used in calls to the Skia SkBitmap::setAlphaType function, which might allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted HTML document, a different vulnerability than CVE-2015-1205.
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- GLSA-201502-13
- GLSA-201502-13
- http://src.chromium.org/viewvc/blink?view=revision&revision=183296
- http://src.chromium.org/viewvc/blink?view=revision&revision=183296
- https://code.google.com/p/chromium/issues/detail?id=411329
- https://code.google.com/p/chromium/issues/detail?id=411329
- https://code.google.com/p/chromium/issues/detail?id=449894
- https://code.google.com/p/chromium/issues/detail?id=449894
Package kernel-image-un-def updated to version 3.18.4-alt1 for branch sisyphus in task 139315.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-9428
The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers to cause a denial of service (mesh-node system crash) via fragmented packets.
- http://bugs.debian.org/774155
- http://bugs.debian.org/774155
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5b6698b0e4a37053de35cc24ee695b98a7eb712b
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5b6698b0e4a37053de35cc24ee695b98a7eb712b
- FEDORA-2015-0517
- FEDORA-2015-0517
- FEDORA-2015-0515
- FEDORA-2015-0515
- MDVSA-2015:058
- MDVSA-2015:058
- [oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel
- [oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel
- [netdev] 20141220 Stable fixes for batman-adv
- [netdev] 20141220 Stable fixes for batman-adv
- USN-2515-1
- USN-2515-1
- USN-2516-1
- USN-2516-1
- USN-2517-1
- USN-2517-1
- USN-2518-1
- USN-2518-1
- https://github.com/torvalds/linux/commit/5b6698b0e4a37053de35cc24ee695b98a7eb712b
- https://github.com/torvalds/linux/commit/5b6698b0e4a37053de35cc24ee695b98a7eb712b
- [b.a.t.m.a.n] 20141118 kernel BUG at net/core/skbuff.c:100
- [b.a.t.m.a.n] 20141118 kernel BUG at net/core/skbuff.c:100
Closed bugs
некорректно указан путь в конфиге
Package kernel-image-std-def updated to version 3.14.30-alt1 for branch sisyphus in task 139316.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-9428
The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers to cause a denial of service (mesh-node system crash) via fragmented packets.
- http://bugs.debian.org/774155
- http://bugs.debian.org/774155
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5b6698b0e4a37053de35cc24ee695b98a7eb712b
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5b6698b0e4a37053de35cc24ee695b98a7eb712b
- FEDORA-2015-0517
- FEDORA-2015-0517
- FEDORA-2015-0515
- FEDORA-2015-0515
- MDVSA-2015:058
- MDVSA-2015:058
- [oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel
- [oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel
- [netdev] 20141220 Stable fixes for batman-adv
- [netdev] 20141220 Stable fixes for batman-adv
- USN-2515-1
- USN-2515-1
- USN-2516-1
- USN-2516-1
- USN-2517-1
- USN-2517-1
- USN-2518-1
- USN-2518-1
- https://github.com/torvalds/linux/commit/5b6698b0e4a37053de35cc24ee695b98a7eb712b
- https://github.com/torvalds/linux/commit/5b6698b0e4a37053de35cc24ee695b98a7eb712b
- [b.a.t.m.a.n] 20141118 kernel BUG at net/core/skbuff.c:100
- [b.a.t.m.a.n] 20141118 kernel BUG at net/core/skbuff.c:100
Package adobe-flash-player updated to version 11-alt40 for branch sisyphus in task 139328.
Closed vulnerabilities
BDU:2015-09810
Уязвимость программной платформы Flash Player, позволяющая удаленному злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-09811
Уязвимость программной платформы Flash Player, позволяющая удаленному злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-10060
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2015-10061
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2015-10322
Уязвимость программной платформы Flash Player, позволяющая нарушителю вызвать отказ в обслуживании или получить контроль над системой
Modified: 2025-02-14
CVE-2015-0311
Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.
- http://helpx.adobe.com/security/products/flash-player/apsa15-01.html
- http://helpx.adobe.com/security/products/flash-player/apsb15-03.html
- SUSE-SU-2015:0151
- SUSE-SU-2015:0163
- http://malware.dontneedcoffee.com/2015/01/unpatched-vulnerability-0day-in-flash.html
- 62432
- 62543
- 62650
- 62660
- 62740
- GLSA-201502-02
- 72283
- 1031597
- https://technet.microsoft.com/library/security/2755801
- http://helpx.adobe.com/security/products/flash-player/apsa15-01.html
- https://technet.microsoft.com/library/security/2755801
- 1031597
- 72283
- GLSA-201502-02
- 62740
- 62660
- 62650
- 62543
- 62432
- http://malware.dontneedcoffee.com/2015/01/unpatched-vulnerability-0day-in-flash.html
- SUSE-SU-2015:0163
- SUSE-SU-2015:0151
- http://helpx.adobe.com/security/products/flash-player/apsb15-03.html
Modified: 2024-11-21
CVE-2015-0312
Double free vulnerability in Adobe Flash Player before 13.0.0.264 and 14.x through 16.x before 16.0.0.296 on Windows and OS X and before 11.2.202.440 on Linux allows attackers to execute arbitrary code via unspecified vectors.
- http://helpx.adobe.com/security/products/flash-player/apsb15-03.html
- http://helpx.adobe.com/security/products/flash-player/apsb15-03.html
- 62432
- 62432
- 62543
- 62543
- 62660
- 62660
- 72343
- 72343
- 1031634
- 1031634
- adobe-flash-cve20150312-code-exec(100394)
- adobe-flash-cve20150312-code-exec(100394)
- https://technet.microsoft.com/library/security/2755801
- https://technet.microsoft.com/library/security/2755801
Closed bugs
а можно бинарник сделать не powertop, а powertop1 чтоб назывался?
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-8634
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0133
- openSUSE-SU-2015:0133
- RHSA-2015:0046
- RHSA-2015:0046
- RHSA-2015:0047
- RHSA-2015:0047
- 62237
- 62237
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62259
- 62259
- 62273
- 62273
- 62274
- 62274
- 62283
- 62283
- 62293
- 62293
- 62304
- 62304
- 62313
- 62313
- 62315
- 62315
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62657
- 62657
- 62790
- 62790
- DSA-3127
- DSA-3127
- DSA-3132
- DSA-3132
- http://www.mozilla.org/security/announce/2014/mfsa2015-01.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-01.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72049
- 72049
- 1031533
- 1031533
- 1031534
- 1031534
- USN-2460-1
- USN-2460-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1109889
- https://bugzilla.mozilla.org/show_bug.cgi?id=1109889
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111737
- https://bugzilla.mozilla.org/show_bug.cgi?id=1111737
- firefox-cve20148634-code-exec(99955)
- firefox-cve20148634-code-exec(99955)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8635
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0133
- openSUSE-SU-2015:0133
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62657
- 62657
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-01.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-01.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72050
- 72050
- 1031533
- 1031533
- 1031534
- 1031534
- https://bugzilla.mozilla.org/show_bug.cgi?id=1026774
- https://bugzilla.mozilla.org/show_bug.cgi?id=1026774
- https://bugzilla.mozilla.org/show_bug.cgi?id=1027300
- https://bugzilla.mozilla.org/show_bug.cgi?id=1027300
- https://bugzilla.mozilla.org/show_bug.cgi?id=1054538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1054538
- https://bugzilla.mozilla.org/show_bug.cgi?id=1067473
- https://bugzilla.mozilla.org/show_bug.cgi?id=1067473
- https://bugzilla.mozilla.org/show_bug.cgi?id=1070962
- https://bugzilla.mozilla.org/show_bug.cgi?id=1070962
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072130
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072130
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072871
- https://bugzilla.mozilla.org/show_bug.cgi?id=1072871
- https://bugzilla.mozilla.org/show_bug.cgi?id=1098583
- https://bugzilla.mozilla.org/show_bug.cgi?id=1098583
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8636
The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- http://packetstormsecurity.com/files/130972/Firefox-Proxy-Prototype-Privileged-Javascript-Injection.html
- http://packetstormsecurity.com/files/130972/Firefox-Proxy-Prototype-Privileged-Javascript-Injection.html
- 62242
- 62242
- 62250
- 62250
- 62418
- 62418
- 62446
- 62446
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-09.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-09.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72041
- 72041
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=987794
- https://bugzilla.mozilla.org/show_bug.cgi?id=987794
- https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636
- https://community.rapid7.com/community/metasploit/blog/2015/03/23/r7-2015-04-disclosure-mozilla-firefox-proxy-prototype-rce-cve-2014-8636
- firefox-cve20148636-sec-bypass(99964)
- firefox-cve20148636-sec-bypass(99964)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8637
Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed BMP data within a CANVAS element.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-02.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-02.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72048
- 72048
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=1094536
- https://bugzilla.mozilla.org/show_bug.cgi?id=1094536
- firefox-cve20148637-info-disc(99957)
- firefox-cve20148637-info-disc(99957)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8638
The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0133
- openSUSE-SU-2015:0133
- RHSA-2015:0046
- RHSA-2015:0046
- RHSA-2015:0047
- RHSA-2015:0047
- 62237
- 62237
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62259
- 62259
- 62273
- 62273
- 62274
- 62274
- 62283
- 62283
- 62293
- 62293
- 62304
- 62304
- 62313
- 62313
- 62315
- 62315
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62657
- 62657
- 62790
- 62790
- DSA-3127
- DSA-3127
- DSA-3132
- DSA-3132
- http://www.mozilla.org/security/announce/2014/mfsa2015-03.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-03.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72047
- 72047
- 1031533
- 1031533
- 1031534
- 1031534
- USN-2460-1
- USN-2460-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1080987
- https://bugzilla.mozilla.org/show_bug.cgi?id=1080987
- firefox-cve20148638-csrf(99958)
- firefox-cve20148638-csrf(99958)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8639
Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- http://linux.oracle.com/errata/ELSA-2015-0047.html
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:1266
- openSUSE-SU-2015:0133
- openSUSE-SU-2015:0133
- RHSA-2015:0046
- RHSA-2015:0046
- RHSA-2015:0047
- RHSA-2015:0047
- 62237
- 62237
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62259
- 62259
- 62273
- 62273
- 62274
- 62274
- 62283
- 62283
- 62293
- 62293
- 62304
- 62304
- 62313
- 62313
- 62315
- 62315
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62657
- 62657
- 62790
- 62790
- DSA-3127
- DSA-3127
- DSA-3132
- DSA-3132
- http://www.mozilla.org/security/announce/2014/mfsa2015-04.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-04.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72046
- 72046
- 1031533
- 1031533
- 1031534
- 1031534
- USN-2460-1
- USN-2460-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1095859
- https://bugzilla.mozilla.org/show_bug.cgi?id=1095859
- firefox-cve20148639-session-hijacking(99959)
- firefox-cve20148639-session-hijacking(99959)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8640
The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a denial of service (uninitialized-memory read and application crash) via crafted API calls.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- 62242
- 62242
- 62250
- 62250
- 62418
- 62418
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-05.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-05.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72045
- 72045
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=1100409
- https://bugzilla.mozilla.org/show_bug.cgi?id=1100409
- firefox-cve20148640-info-disc(99960)
- firefox-cve20148640-info-disc(99960)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8641
Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- http://linux.oracle.com/errata/ELSA-2015-0046.html
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- RHSA-2015:0046
- RHSA-2015:0046
- 62237
- 62237
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62273
- 62273
- 62293
- 62293
- 62313
- 62313
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62790
- 62790
- DSA-3127
- DSA-3127
- http://www.mozilla.org/security/announce/2014/mfsa2015-06.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-06.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72044
- 72044
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=1108455
- https://bugzilla.mozilla.org/show_bug.cgi?id=1108455
- firefox-cve20148641-dos(99961)
- firefox-cve20148641-dos(99961)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-8642
Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0077
- openSUSE-SU-2015:0192
- openSUSE-SU-2015:0192
- 62242
- 62242
- 62250
- 62250
- 62253
- 62253
- 62316
- 62316
- 62418
- 62418
- 62446
- 62446
- 62790
- 62790
- http://www.mozilla.org/security/announce/2014/mfsa2015-08.html
- http://www.mozilla.org/security/announce/2014/mfsa2015-08.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 72042
- 72042
- 1031533
- 1031533
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079658
- https://bugzilla.mozilla.org/show_bug.cgi?id=1079658
- firefox-cve20148642-sec-bypass(99963)
- firefox-cve20148642-sec-bypass(99963)
- GLSA-201504-01
- GLSA-201504-01