ALT-BU-2021-3802-1
Branch p9 update bulletin.
Package openssl1.1 updated to version 1.1.1j-alt1 for branch p9 in task 267719.
Closed vulnerabilities
BDU:2021-03742
Уязвимость функций EVP_CipherUpdate, EVP_EncryptUpdate и EVP_DecryptUpdate инструментария для протоколов TLS и SSL OpenSSL, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03744
Уязвимость функции X509_issuer_and_serial_hash() инструментария для протоколов TLS и SSL OpenSSL, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-23840
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
- https://kc.mcafee.com/corporate/index?page=content&id=SB10366
- https://kc.mcafee.com/corporate/index?page=content&id=SB10366
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- GLSA-202103-03
- GLSA-202103-03
- https://security.netapp.com/advisory/ntap-20210219-0009/
- https://security.netapp.com/advisory/ntap-20210219-0009/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- DSA-4855
- DSA-4855
- https://www.openssl.org/news/secadv/20210216.txt
- https://www.openssl.org/news/secadv/20210216.txt
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-03
- https://www.tenable.com/security/tns-2021-03
- https://www.tenable.com/security/tns-2021-09
- https://www.tenable.com/security/tns-2021-09
- https://www.tenable.com/security/tns-2021-10
- https://www.tenable.com/security/tns-2021-10
Modified: 2024-11-21
CVE-2021-23841
The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
- 20210526 APPLE-SA-2021-05-25-1 iOS 14.6 and iPadOS 14.6
- 20210526 APPLE-SA-2021-05-25-1 iOS 14.6 and iPadOS 14.6
- 20210526 APPLE-SA-2021-05-25-5 Safari 14.1.1
- 20210526 APPLE-SA-2021-05-25-5 Safari 14.1.1
- 20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4
- 20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846
- GLSA-202103-03
- GLSA-202103-03
- https://security.netapp.com/advisory/ntap-20210219-0009/
- https://security.netapp.com/advisory/ntap-20210219-0009/
- https://security.netapp.com/advisory/ntap-20210513-0002/
- https://security.netapp.com/advisory/ntap-20210513-0002/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://support.apple.com/kb/HT212528
- https://support.apple.com/kb/HT212528
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212529
- https://support.apple.com/kb/HT212534
- https://support.apple.com/kb/HT212534
- DSA-4855
- DSA-4855
- https://www.openssl.org/news/secadv/20210216.txt
- https://www.openssl.org/news/secadv/20210216.txt
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-03
- https://www.tenable.com/security/tns-2021-03
- https://www.tenable.com/security/tns-2021-09
- https://www.tenable.com/security/tns-2021-09
Closed vulnerabilities
BDU:2021-03401
Уязвимость функции ippReadIO компонента cups/ipp.c сервера печати CUPS, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-11-21
CVE-2020-10001
An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to read restricted memory.
Closed vulnerabilities
BDU:2021-00850
Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-00852
Уязвимость процесса GPU Process веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-00855
Уязвимость компонента Payments веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-01217
Уязвимость функции TabStrip браузера Google Chrome, связанная с ошибками криптографических преобразований, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01219
Уязвимость интерфейса File System API браузера Google Chrome, связанная с ошибками разграничения доступа, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2021-01220
Уязвимость интерфейса Network Internals браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01221
Уязвимость реализации протокола HTTP браузера Google Chrome, связанная с неправильно реализованной проверкой безопасности для стандартных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2021-01222
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2021-01223
Уязвимость режима чтения браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01225
Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01236
Уязвимость библиотеки для кодирования и декодирования изображений OpenJPEG, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01252
Уязвимость элемента управления пользовательской формы TabStrip веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01253
Уязвимость расширения WebRTC веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01254
Уязвимость элемента управления пользовательской формы TabStrip веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01255
Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01256
Уязвимость компонента Audio браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01257
Уязвимость компонента Audio браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01258
Уязвимость компонента Bookmarks браузера Google Chrome, позволяющая нарушителю получить выполнить произвольный код
BDU:2021-01259
Уязвимость кэша приложения браузера Google Chrome, связанная с ошибками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01260
Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01262
Уязвимость функции изоляции сайтов браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2021-03642
Уязвимость расширений браузера Google Chrome, связанная с ошибками в настройках безопасности, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03643
Уязвимость компонента URL браузера Google Chrome, связанная с ошибками в настройках безопасности, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03644
Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-03645
Уязвимость функции Платежи браузера Google Chrome, связанная с недостатками процедуры аутентификации, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03646
Уязвимость компонента PDFium браузера Google Chrome, связанная с использованием неинициализированного ресурса, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-03647
Уязвимость компонента автодополнения Autofill браузера Google Chrome, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03648
Уязвимость строки URL браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03649
Уязвимость компонента Network Internals браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-03650
Уязвимость функции поиска браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-03655
Уязвимость полноэкранного режима браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03656
Уязвимость компонента автодополнения Autofill браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03657
Уязвимость навигации браузера Google Chrome, связанная с неправильной авторизацией, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03658
Уязвимость API браузера Google Chrome, связанная с недостатками механизмов ограничения домена (Same Origin Policy), позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-04129
Уязвимость API браузера Google Chrome, связанная с недостатками механизмов ограничения домена (Same Origin Policy), позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-06084
Уязвимость функции QR-сканера браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
Modified: 2024-11-21
CVE-2020-27844
A flaw was found in openjpeg's src/lib/openjp2/t2.c in versions prior to 2.4.0. This flaw allows an attacker to provide crafted input to openjpeg during conversion and encoding, causing an out-of-bounds write. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1907521
- https://bugzilla.redhat.com/show_bug.cgi?id=1907521
- [debian-lts-announce] 20210208 [SECURITY] [DLA 2550-1] openjpeg2 security update
- [debian-lts-announce] 20210208 [SECURITY] [DLA 2550-1] openjpeg2 security update
- GLSA-202101-29
- GLSA-202101-29
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Modified: 2024-11-21
CVE-2021-21151
Use after free in Payments in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_16.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_16.html
- https://crbug.com/1165624
- https://crbug.com/1165624
- FEDORA-2021-aa764a8531
- FEDORA-2021-aa764a8531
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- GLSA-202104-08
- GLSA-202104-08
Modified: 2024-11-21
CVE-2021-21154
Heap buffer overflow in Tab Strip in Google Chrome prior to 88.0.4324.182 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_16.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_16.html
- https://crbug.com/1173269
- https://crbug.com/1173269
- FEDORA-2021-aa764a8531
- FEDORA-2021-aa764a8531
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- GLSA-202104-08
- GLSA-202104-08
Modified: 2024-11-21
CVE-2021-21156
Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.182 allowed a remote attacker to potentially exploit heap corruption via a crafted script.
- http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html
- http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_16.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_16.html
- https://crbug.com/1177341
- https://crbug.com/1177341
- FEDORA-2021-aa764a8531
- FEDORA-2021-aa764a8531
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- GLSA-202104-08
- GLSA-202104-08
Modified: 2024-11-21
CVE-2021-21159
Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1171049
- https://crbug.com/1171049
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21160
Heap buffer overflow in WebAudio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1170531
- https://crbug.com/1170531
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1235
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1235
Modified: 2024-11-21
CVE-2021-21161
Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1173702
- https://crbug.com/1173702
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21162
Use after free in WebRTC in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1172054
- https://crbug.com/1172054
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21163
Insufficient data validation in Reader Mode in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page and a malicious server.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1111239
- https://crbug.com/1111239
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21164
Insufficient data validation in Chrome on iOS in Google Chrome on iOS prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1164846
- https://crbug.com/1164846
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
Modified: 2024-11-21
CVE-2021-21165
Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1174582
- https://crbug.com/1174582
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2025-02-04
CVE-2021-21166
Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1177465
- https://crbug.com/1177465
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21167
Use after free in bookmarks in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1161144
- https://crbug.com/1161144
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21168
Insufficient policy enforcement in appcache in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1152226
- https://crbug.com/1152226
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21169
Out of bounds memory access in V8 in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1166138
- https://crbug.com/1166138
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21170
Incorrect security UI in Loader in Google Chrome prior to 89.0.4389.72 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1111646
- https://crbug.com/1111646
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21171
Incorrect security UI in TabStrip and Navigation in Google Chrome on Android prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1152894
- https://crbug.com/1152894
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21172
Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 89.0.4389.72 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1150810
- https://crbug.com/1150810
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21173
Side-channel information leakage in Network Internals in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1154250
- https://crbug.com/1154250
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21174
Inappropriate implementation in Referrer in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1158010
- https://crbug.com/1158010
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21175
Inappropriate implementation in Site isolation in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1146651
- https://crbug.com/1146651
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21176
Inappropriate implementation in full screen mode in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1170584
- https://crbug.com/1170584
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21177
Insufficient policy enforcement in Autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1173879
- https://crbug.com/1173879
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21178
Inappropriate implementation in Compositing in Google Chrome on Linux and Windows prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1174186
- https://crbug.com/1174186
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21179
Use after free in Network Internals in Google Chrome on Linux prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1174943
- https://crbug.com/1174943
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21180
Use after free in tab search in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1175507
- https://crbug.com/1175507
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21181
Side-channel information leakage in autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1182767
- https://crbug.com/1182767
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21182
Insufficient policy enforcement in navigations in Google Chrome prior to 89.0.4389.72 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1049265
- https://crbug.com/1049265
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21183
Inappropriate implementation in performance APIs in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1105875
- https://crbug.com/1105875
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21184
Inappropriate implementation in performance APIs in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1131929
- https://crbug.com/1131929
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21185
Insufficient policy enforcement in extensions in Google Chrome prior to 89.0.4389.72 allowed an attacker who convinced a user to install a malicious extension to obtain sensitive information via a crafted Chrome Extension.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1100748
- https://crbug.com/1100748
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21186
Insufficient policy enforcement in QR scanning in Google Chrome on iOS prior to 89.0.4389.72 allowed an attacker who convinced the user to scan a QR code to bypass navigation restrictions via a crafted QR code.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1153445
- https://crbug.com/1153445
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21187
Insufficient data validation in URL formatting in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1155516
- https://crbug.com/1155516
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21188
Use after free in Blink in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1161739
- https://crbug.com/1161739
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21189
Insufficient policy enforcement in payments in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1165392
- https://crbug.com/1165392
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- GLSA-202104-08
- GLSA-202104-08
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21190
Uninitialized data in PDFium in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop.html
- https://crbug.com/1166091
- https://crbug.com/1166091
- FEDORA-2021-4740239e28
- FEDORA-2021-4740239e28
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-c88a96bd4b
- FEDORA-2021-78547312f2
- FEDORA-2021-78547312f2
- DSA-4886
- DSA-4886
Modified: 2024-11-21
CVE-2021-21200
Out of bounds read in WebUI Settings in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chrome security severity: Low)