ALT-BU-2015-2786-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2015-12254
Уязвимости браузера Google Chrome, позволяющие нарушителю оказать другое воздействие или вызвать отказ в обслуживании
BDU:2015-12255
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00008
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00967
Уязвимость браузера Google Chrome, позволяющая нарушителю внедрить произвольный Веб- или HTML-код
Modified: 2025-04-12
CVE-2015-6788
The ObjectBackedNativeHandler class in extensions/renderer/object_backed_native_handler.cc in the extensions subsystem in Google Chrome before 47.0.2526.80 improperly implements handler functions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
- http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2015-2618.html
- http://www.debian.org/security/2015/dsa-3418
- http://www.securityfocus.com/bid/78734
- https://code.google.com/p/chromium/issues/detail?id=548273
- https://codereview.chromium.org/1422383003/
- https://security.gentoo.org/glsa/201603-09
- http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2015-2618.html
- http://www.debian.org/security/2015/dsa-3418
- http://www.securityfocus.com/bid/78734
- https://code.google.com/p/chromium/issues/detail?id=548273
- https://codereview.chromium.org/1422383003/
- https://security.gentoo.org/glsa/201603-09
Modified: 2025-04-12
CVE-2015-6789
Race condition in the MutationObserver implementation in Blink, as used in Google Chrome before 47.0.2526.80, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact by leveraging unanticipated object deletion.
- http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2015-2618.html
- http://www.debian.org/security/2015/dsa-3418
- http://www.securityfocus.com/bid/78734
- http://www.ubuntu.com/usn/USN-2860-1
- https://code.google.com/p/chromium/issues/detail?id=557981
- https://codereview.chromium.org/1463433002/
- https://security.gentoo.org/glsa/201603-09
- http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2015-2618.html
- http://www.debian.org/security/2015/dsa-3418
- http://www.securityfocus.com/bid/78734
- http://www.ubuntu.com/usn/USN-2860-1
- https://code.google.com/p/chromium/issues/detail?id=557981
- https://codereview.chromium.org/1463433002/
- https://security.gentoo.org/glsa/201603-09
Modified: 2025-04-12
CVE-2015-6790
The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.
- http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2015-2618.html
- http://www.debian.org/security/2015/dsa-3418
- http://www.securityfocus.com/bid/78734
- http://www.ubuntu.com/usn/USN-2860-1
- https://code.google.com/p/chromium/issues/detail?id=542054
- https://codereview.chromium.org/1398453005
- https://security.gentoo.org/glsa/201603-09
- http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2015-2618.html
- http://www.debian.org/security/2015/dsa-3418
- http://www.securityfocus.com/bid/78734
- http://www.ubuntu.com/usn/USN-2860-1
- https://code.google.com/p/chromium/issues/detail?id=542054
- https://codereview.chromium.org/1398453005
- https://security.gentoo.org/glsa/201603-09
Modified: 2025-04-12
CVE-2015-6791
Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.80 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2015-2618.html
- http://www.debian.org/security/2015/dsa-3418
- http://www.securityfocus.com/bid/78734
- http://www.ubuntu.com/usn/USN-2860-1
- https://code.google.com/p/chromium/issues/detail?id=534994
- https://code.google.com/p/chromium/issues/detail?id=555784
- https://code.google.com/p/chromium/issues/detail?id=558840
- https://code.google.com/p/chromium/issues/detail?id=559310
- https://code.google.com/p/chromium/issues/detail?id=567513
- https://security.gentoo.org/glsa/201603-09
- http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2015-2618.html
- http://www.debian.org/security/2015/dsa-3418
- http://www.securityfocus.com/bid/78734
- http://www.ubuntu.com/usn/USN-2860-1
- https://code.google.com/p/chromium/issues/detail?id=534994
- https://code.google.com/p/chromium/issues/detail?id=555784
- https://code.google.com/p/chromium/issues/detail?id=558840
- https://code.google.com/p/chromium/issues/detail?id=559310
- https://code.google.com/p/chromium/issues/detail?id=567513
- https://security.gentoo.org/glsa/201603-09
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-1821
Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder.
- http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html
- http://www.debian.org/security/2015/dsa-3222
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73955
- https://security.gentoo.org/glsa/201507-01
- http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html
- http://www.debian.org/security/2015/dsa-3222
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73955
- https://security.gentoo.org/glsa/201507-01
Modified: 2025-04-12
CVE-2015-1822
chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a large number of command requests.
- http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html
- http://www.debian.org/security/2015/dsa-3222
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73956
- https://security.gentoo.org/glsa/201507-01
- http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html
- http://www.debian.org/security/2015/dsa-3222
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73956
- https://security.gentoo.org/glsa/201507-01
Modified: 2024-11-21
CVE-2015-1853
chrony before 1.31.1 does not properly protect state variables in authenticated symmetric NTP associations, which allows remote attackers with knowledge of NTP peering to cause a denial of service (inability to synchronize) via random timestamps in crafted NTP data packets.