ALT-BU-2021-4491-2
Branch c9f1 update bulletin.
Closed vulnerabilities
BDU:2022-05705
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05756
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-41159
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.
Modified: 2024-11-21
CVE-2021-41160
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7c9r-6r2q-93qg
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7c9r-6r2q-93qg
- [debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update
- [debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update
- FEDORA-2021-2c25f03d0b
- FEDORA-2021-2c25f03d0b
- FEDORA-2021-ac23d9e47f
- FEDORA-2021-ac23d9e47f
- FEDORA-2021-5d227916bc
- FEDORA-2021-5d227916bc
- GLSA-202210-24
- GLSA-202210-24
Package chromium-gost updated to version 92.0.4515.107-alt0.c9.1 for branch c9f1 in task 282059.
Closed vulnerabilities
BDU:2021-03859
Уязвимость набора инструментов для веб-разработки DevTools веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-03860
Уязвимость функции печати веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-03865
Уязвимость компонента Android Intents веб-браузера Google Chrome для Android, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации
BDU:2021-03866
Уязвимость веб-браузера Google Chrome операционных систем Windows, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03867
Уязвимость компонента SQLite веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-03872
Уязвимость функции автозаполнения Autofil веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-03873
Уязвимость набора инструментов для веб-разработки DevTools веб-браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности
BDU:2021-03904
Уязвимость компонента установки Installer веб-браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации
BDU:2021-03905
Уязвимость набора инструментов для веб-разработки DevTools веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03906
Уязвимость графического процессора GPU веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-03907
Уязвимость компонента Protocol Handling веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-03908
Уязвимость функции автозаполнения Autofil веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03909
Уязвимость веб-браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03910
Уязвимость функции «Sharing» («Поделиться») веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03911
Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03912
Уязвимость веб-браузера Google Chrome, связанная с недостаточной проверкой введенных пользователем данных, позволяющая нарушителю проводить спуфинг-атаки
BDU:2021-03940
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03941
Уязвимость реализации технологии XSLT (eXtensible Stylesheet Language Transformations) модуля отображения Blink браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03943
Уязвимость компонента Media веб-браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности
BDU:2021-03956
Уязвимость набора инструментов для веб-разработки DevTools веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03957
Уязвимость компонента Compositing веб-браузера Google Chrome операционных систем Windows, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03971
Уязвимость компонента WebXR браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03980
Уязвимость библиотеки ANGLE браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04019
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04024
Уязвимость пользовательского интерфейса Chromium браузера Google Chrome, позволяющая нарушителю выполнить запись за пределами памяти
BDU:2021-04038
Уязвимость компонента WebGL веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-04040
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04062
Уязвимость интерфейса Web Serial API браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04234
Уязвимость веб-браузера Google Chrome операционных систем iOS, связанная с недостатками разграничения доступа при обработке изображений, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации
BDU:2021-04235
Уязвимость компонента UI framework веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-04236
Уязвимость реализации анимации (Animation) веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2021-30541
Use after free in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-30559
Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-30560
Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html
- https://crbug.com/1219209
- https://crbug.com/1219209
- [debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
- [debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
- GLSA-202310-23
- GLSA-202310-23
- DSA-5216
- DSA-5216
Modified: 2024-11-21
CVE-2021-30561
Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/163835/Chrome-JS-WasmJs-InstallConditionalFeatures-Object-Corruption.html
- http://packetstormsecurity.com/files/163835/Chrome-JS-WasmJs-InstallConditionalFeatures-Object-Corruption.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html
- https://crbug.com/1219630
- https://crbug.com/1219630
Modified: 2024-11-21
CVE-2021-30562
Use after free in WebSerial in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2025-02-19
CVE-2021-30563
Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-30564
Heap buffer overflow in WebXR in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-30565
Out of bounds write in Tab Groups in Google Chrome on Linux and ChromeOS prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1210985
- https://crbug.com/1210985
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30566
Stack buffer overflow in Printing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit stack corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1202661
- https://crbug.com/1202661
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30567
Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to open DevTools to potentially exploit heap corruption via specific user gesture.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1211326
- https://crbug.com/1211326
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30568
Heap buffer overflow in WebGL in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1219886
- https://crbug.com/1219886
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30569
Use after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1218707
- https://crbug.com/1218707
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30571
Insufficient policy enforcement in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1101897
- https://crbug.com/1101897
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30572
Use after free in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1214234
- https://crbug.com/1214234
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30573
Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1216822
- https://crbug.com/1216822
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30574
Use after free in protocol handling in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1227315
- https://crbug.com/1227315
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30575
Out of bounds write in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1213313
- https://crbug.com/1213313
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30576
Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1194896
- https://crbug.com/1194896
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30577
Insufficient policy enforcement in Installer in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform local privilege escalation via a crafted file.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1204811
- https://crbug.com/1204811
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30578
Uninitialized use in Media in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1201074
- https://crbug.com/1201074
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30579
Use after free in UI framework in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1207277
- https://crbug.com/1207277
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30580
Insufficient policy enforcement in Android intents in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious application to obtain potentially sensitive information via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1189092
- https://crbug.com/1189092
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30581
Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1194431
- https://crbug.com/1194431
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30582
Inappropriate implementation in Animation in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1205981
- https://crbug.com/1205981
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30583
Insufficient policy enforcement in image handling in iOS in Google Chrome on iOS prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1179290
- https://crbug.com/1179290
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30584
Incorrect security UI in Downloads in Google Chrome on Android prior to 92.0.4515.107 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1213350
- https://crbug.com/1213350
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30585
Use after free in sensor handling in Google Chrome on Windows prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1023503
- https://crbug.com/1023503
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30586
Use after free in dialog box handling in Windows in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1201032
- https://crbug.com/1201032
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30587
Inappropriate implementation in Compositing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1204347
- https://crbug.com/1204347
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30588
Type confusion in V8 in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1195650
- https://crbug.com/1195650
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30589
Insufficient validation of untrusted input in Sharing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to bypass navigation restrictions via a crafted click-to-call link.
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html
- https://crbug.com/1180510
- https://crbug.com/1180510
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-0928
libhtp 0.5.15 allows remote attackers to cause a denial of service (NULL pointer dereference).
Modified: 2024-11-21
CVE-2018-10243
htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a heap-based buffer over-read via an authorization digest header.
Modified: 2024-11-21
CVE-2019-17420
In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing error causes the http_header signature to not alert on a response with a single \r\n ending.
Closed vulnerabilities
BDU:2018-00358
Уязвимость драйвера обработки TCP-пакетов систем обнаружения вторжений Snort и Suricata IDS, позволяющая нарушителю обойти функцию обнаружения сетевых атак
Modified: 2024-11-21
CVE-2018-14568
Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).
- https://github.com/kirillwow/ids_bypass
- https://github.com/OISF/suricata/pull/3428/commits/843d0b7a10bb45627f94764a6c5d468a24143345
- https://redmine.openinfosecfoundation.org/issues/2501
- https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/
- https://github.com/kirillwow/ids_bypass
- https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/
- https://redmine.openinfosecfoundation.org/issues/2501
- https://github.com/OISF/suricata/pull/3428/commits/843d0b7a10bb45627f94764a6c5d468a24143345
Modified: 2024-11-21
CVE-2018-18956
The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as exploited in the wild in November 2018.
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-November/016316.html
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-November/016316.html
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-October/016227.html
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-October/016227.html
- https://redmine.openinfosecfoundation.org/issues/2658#change-10374
- https://redmine.openinfosecfoundation.org/issues/2658#change-10374
Modified: 2024-11-21
CVE-2018-6794
Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.
- https://github.com/OISF/suricata/pull/3202/commits/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
- https://github.com/OISF/suricata/pull/3202/commits/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
- [debian-lts-announce] 20181204 [SECURITY] [DLA 1603-1] suricata security update
- [debian-lts-announce] 20181204 [SECURITY] [DLA 1603-1] suricata security update
- https://redmine.openinfosecfoundation.org/issues/2427
- https://redmine.openinfosecfoundation.org/issues/2427
- https://suricata-ids.org/2018/02/14/suricata-4-0-4-available/
- https://suricata-ids.org/2018/02/14/suricata-4-0-4-available/
- 44247
- 44247
Modified: 2024-11-21
CVE-2019-10050
A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for shim, an attacker can manipulate the control flow, such that the condition to leave the loop is true. After leaving the loop, the network packet has a length of 2 bytes. There is no validation of this length. Later on, the code tries to read at an empty position, leading to a crash.
Modified: 2024-11-21
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe, https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b). The attack vector is: An attacker can trigger the vulnerability by sending a specifically crafted network request. The fixed version is: 4.1.2.
- https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe
- https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe
- https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b
- https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b
- https://redmine.openinfosecfoundation.org/issues/2736
- https://redmine.openinfosecfoundation.org/issues/2736
Modified: 2024-11-21
CVE-2019-1010279
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b). The attack vector is: An attacker can trigger the vulnerability by a specifically crafted network TCP session. The fixed version is: 4.1.3.
- https://github.com/OISF/suricata/pull/3625
- https://github.com/OISF/suricata/pull/3625
- https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b
- https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b
- https://redmine.openinfosecfoundation.org/issues/2770
- https://redmine.openinfosecfoundation.org/issues/2770