ALT-BU-2021-4233-1
Branch sisyphus update bulletin.
Package kernel-image-rt updated to version 5.10.65-alt1.rt53 for branch sisyphus in task 285536.
Closed vulnerabilities
BDU:2021-05536
Уязвимость реализации функции check_map_func_compatibility() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии
BDU:2022-00682
Уязвимость подсистемы виртуализации KVM ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии
BDU:2022-05781
Уязвимость функции decode_data компонента drivers/net/hamradio/6pack.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-34866
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689.
Modified: 2024-11-21
CVE-2021-3653
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1983686
- https://bugzilla.redhat.com/show_bug.cgi?id=1983686
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- https://www.openwall.com/lists/oss-security/2021/08/16/1
- https://www.openwall.com/lists/oss-security/2021/08/16/1
Modified: 2024-11-21
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
- https://bugzilla.redhat.com/show_bug.cgi?id=1983988
- https://bugzilla.redhat.com/show_bug.cgi?id=1983988
- https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://www.openwall.com/lists/oss-security/2021/08/16/1
- https://www.openwall.com/lists/oss-security/2021/08/16/1
Modified: 2024-11-21
CVE-2021-42008
The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.13
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19d1532a187669ce86d5a2696eb7275310070793
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- https://security.netapp.com/advisory/ntap-20211104-0002/
- https://security.netapp.com/advisory/ntap-20211104-0002/
- https://www.youtube.com/watch?v=d5f9xLK8Vhw
- https://www.youtube.com/watch?v=d5f9xLK8Vhw
Modified: 2024-11-21
CVE-2022-1043
A flaw was found in the Linux kernel’s io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges.
- http://packetstormsecurity.com/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html
- http://packetstormsecurity.com/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html
- https://access.redhat.com/security/cve/CVE-2022-1043
- https://access.redhat.com/security/cve/CVE-2022-1043
- https://bugzilla.redhat.com/show_bug.cgi?id=1997328
- https://bugzilla.redhat.com/show_bug.cgi?id=1997328
- https://github.com/torvalds/linux/commit/a30f895ad3239f45012e860d4f94c1a388b36d14
- https://github.com/torvalds/linux/commit/a30f895ad3239f45012e860d4f94c1a388b36d14
- https://www.zerodayinitiative.com/advisories/ZDI-22-362/
- https://www.zerodayinitiative.com/advisories/ZDI-22-362/
Package kernel-image-mp updated to version 5.14.8-alt1 for branch sisyphus in task 285991.
Closed vulnerabilities
BDU:2021-05848
Уязвимость функции selinux_ptrace_traceme() ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-00681
Уязвимость функции loop_rw_iter (fs/io_uring.c ) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05842
Уязвимость функции aspeed_lpc_ctrl_mmap компонента drivers/soc/aspeed/aspeed-lpc-ctrl.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-41073
loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/
- http://www.openwall.com/lists/oss-security/2021/09/18/2
- http://www.openwall.com/lists/oss-security/2021/09/18/2
- [oss-security] 20210918 Linux Kernel: Exploitable vulnerability in io_uring
- [oss-security] 20210918 Linux Kernel: Exploitable vulnerability in io_uring
- [oss-security] 20220604 Re: Linux Kernel: Exploitable vulnerability in io_uring
- [oss-security] 20220604 Re: Linux Kernel: Exploitable vulnerability in io_uring
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc
- FEDORA-2021-e0d6215753
- FEDORA-2021-e0d6215753
- FEDORA-2021-884d245ef8
- FEDORA-2021-884d245ef8
- https://security.netapp.com/advisory/ntap-20211014-0003/
- https://security.netapp.com/advisory/ntap-20211014-0003/
- DSA-4978
- DSA-4978
Modified: 2024-11-21
CVE-2021-42252
An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.6
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b49a0e69a7b1a68c8d3f64097d06dabb770fec96
- https://security.netapp.com/advisory/ntap-20211112-0006/
- https://security.netapp.com/advisory/ntap-20211112-0006/
Modified: 2024-11-21
CVE-2021-43057
An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task.
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2229
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2229
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.8
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.8
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3727a8bac0a9e77c70820655fd8715523ba3db7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a3727a8bac0a9e77c70820655fd8715523ba3db7
- https://security.netapp.com/advisory/ntap-20211125-0001/
- https://security.netapp.com/advisory/ntap-20211125-0001/
Closed bugs
Обновить до >= 1.3.4
Package kernel-image-std-pae updated to version 5.10.69-alt1 for branch sisyphus in task 285965.
Closed vulnerabilities
BDU:2017-01556
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегии суперпользователя
BDU:2021-03395
Уязвимость ядра операционной системы Linux, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-6074
The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
- RHSA-2017:0293
- RHSA-2017:0293
- RHSA-2017:0294
- RHSA-2017:0294
- RHSA-2017:0295
- RHSA-2017:0295
- RHSA-2017:0316
- RHSA-2017:0316
- RHSA-2017:0323
- RHSA-2017:0323
- RHSA-2017:0324
- RHSA-2017:0324
- RHSA-2017:0345
- RHSA-2017:0345
- RHSA-2017:0346
- RHSA-2017:0346
- RHSA-2017:0347
- RHSA-2017:0347
- RHSA-2017:0365
- RHSA-2017:0365
- RHSA-2017:0366
- RHSA-2017:0366
- RHSA-2017:0403
- RHSA-2017:0403
- RHSA-2017:0501
- RHSA-2017:0501
- DSA-3791
- DSA-3791
- [oss-security] 20170222 Linux kernel: CVE-2017-6074: DCCP double-free vulnerability (local root)
- [oss-security] 20170222 Linux kernel: CVE-2017-6074: DCCP double-free vulnerability (local root)
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- 96310
- 96310
- 1037876
- 1037876
- RHSA-2017:0932
- RHSA-2017:0932
- RHSA-2017:1209
- RHSA-2017:1209
- https://github.com/torvalds/linux/commit/5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4
- https://github.com/torvalds/linux/commit/5edabca9d4cff7f1f2b68f0bac55ef99d9798ba4
- https://source.android.com/security/bulletin/2017-07-01
- https://source.android.com/security/bulletin/2017-07-01
- 41457
- 41457
- 41458
- 41458
- https://www.tenable.com/security/tns-2017-07
- https://www.tenable.com/security/tns-2017-07
Modified: 2024-11-21
CVE-2020-16119
Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.
- https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695
- https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal/commit/?id=01872cb896c76cedeabe93a08456976ab55ad695
- https://launchpad.net/bugs/1883840
- https://launchpad.net/bugs/1883840
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza%40canonical.com/T/
- https://lore.kernel.org/netdev/20201013171849.236025-1-kleber.souza%40canonical.com/T/
- https://security.netapp.com/advisory/ntap-20210304-0006/
- https://security.netapp.com/advisory/ntap-20210304-0006/
- https://ubuntu.com/USN-4576-1
- https://ubuntu.com/USN-4576-1
- https://ubuntu.com/USN-4577-1
- https://ubuntu.com/USN-4577-1
- https://ubuntu.com/USN-4578-1
- https://ubuntu.com/USN-4578-1
- https://ubuntu.com/USN-4579-1
- https://ubuntu.com/USN-4579-1
- https://ubuntu.com/USN-4580-1
- https://ubuntu.com/USN-4580-1
- DSA-4978
- DSA-4978
Closed vulnerabilities
BDU:2021-06193
Уязвимость кодека libjpeg-turbo, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-06421
Уязвимость автономного режима браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить код в контексте привилегированного процесса
BDU:2021-06424
Уязвимость программного интерфейса Background Fetch API браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-06431
Уязвимость интерфейса File System API браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-00050
Уязвимость приложение для загрузки программ Google Updater браузера Google Chrome, операционной системы Windows , связанная с небезопасным управлением привилегиями, позволяющая нарушителю повысить свои привилегии через созданный файл
BDU:2022-00051
Уязвимость компонента Tab Strip браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2022-00052
Уязвимость функции Navigation браузера Google Chrome, операционной системы Windows , позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2022-00053
Уязвимость диспетчера задач браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольные команды
BDU:2022-00054
Уязвимость компонента ChromeOS Networking браузера Google Chrome, позволяющая нарушителю получить привилегированный доступ к инфраструктуре через созданный файл ONC
BDU:2022-00056
Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2022-00059
Уязвимость API для работы с компьютерной графикой WebGPU браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2022-00060
Уязвимость компонента Performance Manager браузера Google Chrome, позволяющая нарушителю выполнить код в контексте привилегированного процесса с помощью специально созданной HTML страницы
BDU:2022-00074
Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющие нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2022-00075
Уязвимость компонента compositing браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданной HTML страницы
BDU:2022-00076
Уязвимость программного интерфейса Background Fetch API браузера Google Chrome , связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-00077
Уязвимость программного интерфейса Background Fetch API браузера Google Chrome, связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2021-37956
Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1243117
- https://crbug.com/1243117
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37957
Use after free in WebGPU in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1242269
- https://crbug.com/1242269
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37958
Inappropriate implementation in Navigation in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1223290
- https://crbug.com/1223290
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37959
Use after free in Task Manager in Google Chrome prior to 94.0.4606.54 allowed an attacker who convinced a user to enage in a series of user gestures to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1229625
- https://crbug.com/1229625
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2023-11-07
CVE-2021-37960
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Modified: 2024-11-21
CVE-2021-37961
Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1228557
- https://crbug.com/1228557
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37962
Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1231933
- https://crbug.com/1231933
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37963
Side-channel information leakage in DevTools in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to bypass site isolation via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1199865
- https://crbug.com/1199865
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37964
Inappropriate implementation in ChromeOS Networking in Google Chrome on ChromeOS prior to 94.0.4606.54 allowed an attacker with a rogue wireless access point to to potentially carryout a wifi impersonation attack via a crafted ONC file.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1203612
- https://crbug.com/1203612
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37965
Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1239709
- https://crbug.com/1239709
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37966
Inappropriate implementation in Compositing in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1238944
- https://crbug.com/1238944
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37967
Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1243622
- https://crbug.com/1243622
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37968
Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1245053
- https://crbug.com/1245053
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37969
Inappropriate implementation in Google Updater in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to perform local privilege escalation via a crafted file.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1245879
- https://crbug.com/1245879
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37970
Use after free in File System API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1248030
- https://crbug.com/1248030
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37971
Incorrect security UI in Web Browser UI in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1219354
- https://crbug.com/1219354
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37972
Out of bounds read in libjpeg-turbo in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1234259
- https://crbug.com/1234259
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-359a715688
- FEDORA-2021-359a715688
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046