ALT-PU-2013-1119-1
Closed vulnerabilities
BDU:2015-06136
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06137
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06138
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06139
Множественные уязвимости пакета libjpeg-turbo-static-1.2.1 операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07110
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07111
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07112
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09076
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09077
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09078
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09079
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09080
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09081
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09082
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2019-04721
Уязвимость расширения Kaspersky Protection браузера Google Chrome, позволяющая нарушителю удалить произвольные расширения chrome
Modified: 2024-11-21
CVE-2013-2931
Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=263255
- https://code.google.com/p/chromium/issues/detail?id=263255
- https://code.google.com/p/chromium/issues/detail?id=264574
- https://code.google.com/p/chromium/issues/detail?id=264574
- https://code.google.com/p/chromium/issues/detail?id=271235
- https://code.google.com/p/chromium/issues/detail?id=271235
- https://code.google.com/p/chromium/issues/detail?id=282738
- https://code.google.com/p/chromium/issues/detail?id=282738
- https://code.google.com/p/chromium/issues/detail?id=285578
- https://code.google.com/p/chromium/issues/detail?id=285578
- https://code.google.com/p/chromium/issues/detail?id=286368
- https://code.google.com/p/chromium/issues/detail?id=286368
- https://code.google.com/p/chromium/issues/detail?id=296276
- https://code.google.com/p/chromium/issues/detail?id=296276
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/chromium/issues/detail?id=297556
- https://code.google.com/p/chromium/issues/detail?id=297556
- https://code.google.com/p/chromium/issues/detail?id=299835
- https://code.google.com/p/chromium/issues/detail?id=299835
- https://code.google.com/p/chromium/issues/detail?id=299993
- https://code.google.com/p/chromium/issues/detail?id=299993
- https://code.google.com/p/chromium/issues/detail?id=302810
- https://code.google.com/p/chromium/issues/detail?id=302810
- https://code.google.com/p/chromium/issues/detail?id=303232
- https://code.google.com/p/chromium/issues/detail?id=303232
- https://code.google.com/p/chromium/issues/detail?id=304226
- https://code.google.com/p/chromium/issues/detail?id=304226
- https://code.google.com/p/chromium/issues/detail?id=306255
- https://code.google.com/p/chromium/issues/detail?id=306255
- https://code.google.com/p/chromium/issues/detail?id=314225
- https://code.google.com/p/chromium/issues/detail?id=314225
- https://code.google.com/p/chromium/issues/detail?id=315823
- https://code.google.com/p/chromium/issues/detail?id=315823
- oval:org.mitre.oval:def:19183
- oval:org.mitre.oval:def:19183
Modified: 2024-11-21
CVE-2013-6621
Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=268565
- https://code.google.com/p/chromium/issues/detail?id=268565
- oval:org.mitre.oval:def:19006
- oval:org.mitre.oval:def:19006
Modified: 2024-11-21
CVE-2013-6622
Use-after-free vulnerability in the HTMLMediaElement::didMoveToNewDocument function in core/html/HTMLMediaElement.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the movement of a media element between documents.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=272786
- https://code.google.com/p/chromium/issues/detail?id=272786
- oval:org.mitre.oval:def:18335
- oval:org.mitre.oval:def:18335
- https://src.chromium.org/viewvc/blink?revision=159031&view=revision
- https://src.chromium.org/viewvc/blink?revision=159031&view=revision
Modified: 2024-11-21
CVE-2013-6623
The SVG implementation in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging the use of tree order, rather than transitive dependency order, for layout.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=282925
- https://code.google.com/p/chromium/issues/detail?id=282925
- oval:org.mitre.oval:def:19311
- oval:org.mitre.oval:def:19311
- https://src.chromium.org/viewvc/blink?revision=158480&view=revision
- https://src.chromium.org/viewvc/blink?revision=158480&view=revision
Modified: 2024-11-21
CVE-2013-6624
Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=290566
- https://code.google.com/p/chromium/issues/detail?id=290566
- oval:org.mitre.oval:def:19168
- oval:org.mitre.oval:def:19168
Modified: 2024-11-21
CVE-2013-6625
Use-after-free vulnerability in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of DOM range objects in circumstances that require child node removal after a (1) mutation or (2) blur event.
- APPLE-SA-2014-04-01-1
- APPLE-SA-2014-04-01-1
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=295010
- https://code.google.com/p/chromium/issues/detail?id=295010
- oval:org.mitre.oval:def:19257
- oval:org.mitre.oval:def:19257
- https://src.chromium.org/viewvc/blink?revision=160037&view=revision
- https://src.chromium.org/viewvc/blink?revision=160037&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-6626
The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=295695
- https://code.google.com/p/chromium/issues/detail?id=295695
- oval:org.mitre.oval:def:18401
- oval:org.mitre.oval:def:18401
- https://src.chromium.org/viewvc/chrome?revision=225026&view=revision
- https://src.chromium.org/viewvc/chrome?revision=225026&view=revision
Modified: 2024-11-21
CVE-2013-6627
net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response.
- http://blog.skylined.nl/20161219001.html
- http://blog.skylined.nl/20161219001.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html
- http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html
- 20161219 CVE-2013-6627: Chrome Chrome HTTP 1xx base::StringTokenizerT<...>::QuickGetNext OOBR
- 20161219 CVE-2013-6627: Chrome Chrome HTTP 1xx base::StringTokenizerT<...>::QuickGetNext OOBR
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=299892
- https://code.google.com/p/chromium/issues/detail?id=299892
- oval:org.mitre.oval:def:19113
- oval:org.mitre.oval:def:19113
- https://src.chromium.org/viewvc/chrome?revision=226539&view=revision
- https://src.chromium.org/viewvc/chrome?revision=226539&view=revision
- 40944
- 40944
Modified: 2024-11-21
CVE-2013-6628
net/socket/ssl_client_socket_nss.cc in the TLS implementation in Google Chrome before 31.0.1650.48 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which might allow remote web servers to interfere with trust relationships by renegotiating a session.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=306959
- https://code.google.com/p/chromium/issues/detail?id=306959
- oval:org.mitre.oval:def:19108
- oval:org.mitre.oval:def:19108
- https://secure-resumption.com/
- https://secure-resumption.com/
- https://src.chromium.org/viewvc/chrome?revision=229611&view=revision
- https://src.chromium.org/viewvc/chrome?revision=229611&view=revision
Modified: 2024-11-21
CVE-2013-6629
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
- http://advisories.mageia.org/MGASA-2013-0333.html
- http://advisories.mageia.org/MGASA-2013-0333.html
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- http://bugs.ghostscript.com/show_bug.cgi?id=686980
- http://bugs.ghostscript.com/show_bug.cgi?id=686980
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- HPSBUX03091
- HPSBUX03091
- SSRT101667
- SSRT101667
- HPSBUX03092
- HPSBUX03092
- SSRT101668
- SSRT101668
- RHSA-2013:1803
- RHSA-2013:1803
- RHSA-2013:1804
- RHSA-2013:1804
- 56175
- 56175
- 58974
- 58974
- 59058
- 59058
- GLSA-201406-32
- GLSA-201406-32
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2799
- DSA-2799
- MDVSA-2013:273
- MDVSA-2013:273
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- 63676
- 63676
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- USN-2060-1
- USN-2060-1
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- RHSA-2014:0413
- RHSA-2014:0413
- RHSA-2014:0414
- RHSA-2014:0414
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629
- GLSA-201606-03
- GLSA-201606-03
- https://src.chromium.org/viewvc/chrome?revision=229729&view=revision
- https://src.chromium.org/viewvc/chrome?revision=229729&view=revision
- https://www.ibm.com/support/docview.wss?uid=swg21675973
- https://www.ibm.com/support/docview.wss?uid=swg21675973
Modified: 2024-11-21
CVE-2013-6630
The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
- http://advisories.mageia.org/MGASA-2013-0333.html
- http://advisories.mageia.org/MGASA-2013-0333.html
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git%3Ba=commit%3Bh=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8
- http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git%3Ba=commit%3Bh=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- RHSA-2013:1803
- RHSA-2013:1803
- 56175
- 56175
- DSA-2799
- DSA-2799
- MDVSA-2013:273
- MDVSA-2013:273
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- USN-2060-1
- USN-2060-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://code.google.com/p/chromium/issues/detail?id=299835
- https://code.google.com/p/chromium/issues/detail?id=299835
- GLSA-201606-03
- GLSA-201606-03
Modified: 2024-11-21
CVE-2013-6631
Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/webrtc/source/detail?r=4827
- https://code.google.com/p/webrtc/source/detail?r=4827
- https://webrtc-codereview.appspot.com/2275008
- https://webrtc-codereview.appspot.com/2275008
Modified: 2024-11-21
CVE-2013-6632
Integer overflow in Google Chrome before 31.0.1650.57 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013.
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319125
- https://code.google.com/p/chromium/issues/detail?id=319125
Modified: 2024-11-21
CVE-2019-15684
Kaspersky Protection extension for web browser Google Chrome prior to 30.112.62.0 was vulnerable to unauthorized access to its features remotely that could lead to removing other installed extensions.