ALT-BU-2016-2561-1
Branch sisyphus update bulletin.
Package v8-chromium updated to version 4.8.271.17-alt1 for branch sisyphus in task 156732.
Closed vulnerabilities
BDU:2016-00397
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2016-1612
The LoadIC::UpdateCaches function in ic/ic.cc in Google V8, as used in Google Chrome before 48.0.2564.82, does not ensure receiver compatibility before performing a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact via crafted JavaScript code.
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0271
- openSUSE-SU-2016:0271
- RHSA-2016:0072
- RHSA-2016:0072
- DSA-3456
- DSA-3456
- 81431
- 81431
- 1034801
- 1034801
- USN-2877-1
- USN-2877-1
- https://chromium.googlesource.com/v8/v8/+/cfbd16172fa165cc33ce0e2e72f74e5561168a61
- https://chromium.googlesource.com/v8/v8/+/cfbd16172fa165cc33ce0e2e72f74e5561168a61
- https://code.google.com/p/chromium/issues/detail?id=497632
- https://code.google.com/p/chromium/issues/detail?id=497632
- https://codereview.chromium.org/1531583005
- https://codereview.chromium.org/1531583005
- GLSA-201603-09
- GLSA-201603-09
Closed vulnerabilities
BDU:2016-00398
Уязвимости браузера Google Chrome, позволяющие нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00399
Уязвимость браузера Google Chrome, позволяющая нарушителю получить конфиденциальную информацию
BDU:2016-00400
Уязвимость браузера Google Chrome, позволяющая нарушителю подменить источник документа
BDU:2016-00401
Уязвимость браузера Google Chrome, позволяющая нарушителю подменить URL-адреса
BDU:2016-00402
Уязвимость браузера Google Chrome, позволяющая нарушителю определить, какой веб-сайт был посещен с использованием HSTS-соединения
BDU:2016-00403
Уязвимость браузера Google Chrome, позволяющая нарушителю взломать криптографический механизм защиты
BDU:2016-00404
Уязвимости браузера Google Chrome, позволяющие нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00408
Уязвимости браузера Google Chrome, позволяющие нарушителю оказать другое воздействие или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2005-4900
SHA-1 is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of SHA-1 in TLS 1.2. NOTE: this CVE exists to provide a common identifier for referencing this SHA-1 issue; the existence of an identifier is not, by itself, a technology recommendation.
- http://ia.cr/2007/474
- http://ia.cr/2007/474
- http://shattered.io/
- http://shattered.io/
- http://www.cwi.nl/news/2017/cwi-and-google-announce-first-collision-industry-security-standard-sha-1
- http://www.cwi.nl/news/2017/cwi-and-google-announce-first-collision-industry-security-standard-sha-1
- 12577
- 12577
- https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/
- https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/
- https://kc.mcafee.com/corporate/index?page=content&id=SB10340
- https://kc.mcafee.com/corporate/index?page=content&id=SB10340
- https://security.googleblog.com/2015/12/an-update-on-sha-1-certificates-in.html
- https://security.googleblog.com/2015/12/an-update-on-sha-1-certificates-in.html
- https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html
- https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html
- https://sites.google.com/site/itstheshappening
- https://sites.google.com/site/itstheshappening
- https://www.schneier.com/blog/archives/2005/02/sha1_broken.html
- https://www.schneier.com/blog/archives/2005/02/sha1_broken.html
- https://www.schneier.com/blog/archives/2005/08/new_cryptanalyt.html
- https://www.schneier.com/blog/archives/2005/08/new_cryptanalyt.html
Modified: 2024-11-21
CVE-2016-1613
Multiple use-after-free vulnerabilities in the formfiller implementation in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to improper tracking of the destruction of (1) IPWL_FocusHandler and (2) IPWL_Provider objects.
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0271
- openSUSE-SU-2016:0271
- RHSA-2016:0072
- RHSA-2016:0072
- DSA-3456
- DSA-3456
- 81430
- 81430
- 1034801
- 1034801
- https://code.google.com/p/chromium/issues/detail?id=572871
- https://code.google.com/p/chromium/issues/detail?id=572871
- https://codereview.chromium.org/1564773003
- https://codereview.chromium.org/1564773003
- https://pdfium.googlesource.com/pdfium/+/dcac57bc8b64fdc870d79d11a498ae7021cf8ae7
- https://pdfium.googlesource.com/pdfium/+/dcac57bc8b64fdc870d79d11a498ae7021cf8ae7
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1614
The UnacceleratedImageBufferSurface class in WebKit/Source/platform/graphics/UnacceleratedImageBufferSurface.cpp in Blink, as used in Google Chrome before 48.0.2564.82, mishandles the initialization mode, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0271
- openSUSE-SU-2016:0271
- RHSA-2016:0072
- RHSA-2016:0072
- DSA-3456
- DSA-3456
- 81430
- 81430
- 1034801
- 1034801
- USN-2877-1
- USN-2877-1
- https://code.google.com/p/chromium/issues/detail?id=544691
- https://code.google.com/p/chromium/issues/detail?id=544691
- https://codereview.chromium.org/1407393002/
- https://codereview.chromium.org/1407393002/
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1615
The Omnibox implementation in Google Chrome before 48.0.2564.82 allows remote attackers to spoof a document's origin via unspecified vectors.
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0271
- openSUSE-SU-2016:0271
- RHSA-2016:0072
- RHSA-2016:0072
- DSA-3456
- DSA-3456
- 81430
- 81430
- 1034801
- 1034801
- https://code.google.com/p/chromium/issues/detail?id=468179
- https://code.google.com/p/chromium/issues/detail?id=468179
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1616
The CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc in Google Chrome before 48.0.2564.82 allows remote attackers to spoof URLs via vectors involving an unfocused custom button.
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0271
- openSUSE-SU-2016:0271
- RHSA-2016:0072
- RHSA-2016:0072
- DSA-3456
- DSA-3456
- 81430
- 81430
- 1034801
- 1034801
- https://code.google.com/p/chromium/issues/detail?id=541415
- https://code.google.com/p/chromium/issues/detail?id=541415
- https://codereview.chromium.org/1437523005
- https://codereview.chromium.org/1437523005
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1617
The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 48.0.2564.82, does not apply http policies to https URLs and does not apply ws policies to wss URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report.
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0271
- openSUSE-SU-2016:0271
- RHSA-2016:0072
- RHSA-2016:0072
- DSA-3456
- DSA-3456
- 81430
- 81430
- 1034801
- 1034801
- USN-2877-1
- USN-2877-1
- https://code.google.com/p/chromium/issues/detail?id=544765
- https://code.google.com/p/chromium/issues/detail?id=544765
- https://codereview.chromium.org/1455973003
- https://codereview.chromium.org/1455973003
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1618
Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0271
- openSUSE-SU-2016:0271
- RHSA-2016:0072
- RHSA-2016:0072
- DSA-3456
- DSA-3456
- 81430
- 81430
- 1034801
- 1034801
- USN-2877-1
- USN-2877-1
- https://code.google.com/p/chromium/issues/detail?id=552749
- https://code.google.com/p/chromium/issues/detail?id=552749
- https://codereview.chromium.org/1419293005
- https://codereview.chromium.org/1419293005
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1619
Multiple integer overflows in the (1) sycc422_to_rgb and (2) sycc444_to_rgb functions in fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted PDF document.
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0249
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0250
- openSUSE-SU-2016:0271
- openSUSE-SU-2016:0271
- RHSA-2016:0072
- RHSA-2016:0072
- DSA-3456
- DSA-3456
- 81430
- 81430
- 1034801
- 1034801
- https://code.google.com/p/chromium/issues/detail?id=557223
- https://code.google.com/p/chromium/issues/detail?id=557223
- https://codereview.chromium.org/1521473003
- https://codereview.chromium.org/1521473003
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-2051
Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Package firefox-esr updated to version 38.6.0-alt1 for branch sisyphus in task 156740.
Closed vulnerabilities
No data currently available.
No data currently available.
No data currently available.