ALT-PU-2013-1122-1
Closed vulnerabilities
BDU:2015-06136
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06137
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06138
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-06139
Множественные уязвимости пакета libjpeg-turbo-static-1.2.1 операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07110
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07111
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-07112
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09076
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09077
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09078
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09079
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09080
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09081
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2015-09082
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
BDU:2019-04721
Уязвимость расширения Kaspersky Protection браузера Google Chrome, позволяющая нарушителю удалить произвольные расширения chrome
Modified: 2024-11-21
CVE-2013-2906
Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.cpp, core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=223962
- https://code.google.com/p/chromium/issues/detail?id=223962
- https://code.google.com/p/chromium/issues/detail?id=270758
- https://code.google.com/p/chromium/issues/detail?id=270758
- https://code.google.com/p/chromium/issues/detail?id=271161
- https://code.google.com/p/chromium/issues/detail?id=271161
- https://code.google.com/p/chromium/issues/detail?id=284785
- https://code.google.com/p/chromium/issues/detail?id=284785
- https://code.google.com/p/chromium/issues/detail?id=284786
- https://code.google.com/p/chromium/issues/detail?id=284786
- oval:org.mitre.oval:def:19013
- oval:org.mitre.oval:def:19013
- https://src.chromium.org/viewvc/blink?revision=157243&view=revision
- https://src.chromium.org/viewvc/blink?revision=157243&view=revision
- https://src.chromium.org/viewvc/blink?revision=157245&view=revision
- https://src.chromium.org/viewvc/blink?revision=157245&view=revision
- https://src.chromium.org/viewvc/blink?revision=157256&view=revision
- https://src.chromium.org/viewvc/blink?revision=157256&view=revision
- https://src.chromium.org/viewvc/blink?revision=157259&view=revision
- https://src.chromium.org/viewvc/blink?revision=157259&view=revision
- https://src.chromium.org/viewvc/blink?revision=157273&view=revision
- https://src.chromium.org/viewvc/blink?revision=157273&view=revision
Modified: 2024-11-21
CVE-2013-2907
The Window.prototype object implementation in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=260667
- https://code.google.com/p/chromium/issues/detail?id=260667
- oval:org.mitre.oval:def:18695
- oval:org.mitre.oval:def:18695
Modified: 2024-11-21
CVE-2013-2908
Google Chrome before 30.0.1599.66 uses incorrect function calls to determine the values of NavigationEntry objects, which allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=265221
- https://code.google.com/p/chromium/issues/detail?id=265221
- oval:org.mitre.oval:def:18782
- oval:org.mitre.oval:def:18782
- https://src.chromium.org/viewvc/chrome?revision=217485&view=revision
- https://src.chromium.org/viewvc/chrome?revision=217485&view=revision
Modified: 2024-11-21
CVE-2013-2909
Use-after-free vulnerability in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to inline-block rendering for bidirectional Unicode text in an element isolated from its siblings.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=265838
- https://code.google.com/p/chromium/issues/detail?id=265838
- https://code.google.com/p/chromium/issues/detail?id=279277
- https://code.google.com/p/chromium/issues/detail?id=279277
- oval:org.mitre.oval:def:19012
- oval:org.mitre.oval:def:19012
- https://src.chromium.org/viewvc/blink?revision=156580&view=revision
- https://src.chromium.org/viewvc/blink?revision=156580&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2910
Use-after-free vulnerability in modules/webaudio/AudioScheduledSourceNode.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=269753
- https://code.google.com/p/chromium/issues/detail?id=269753
- oval:org.mitre.oval:def:18812
- oval:org.mitre.oval:def:18812
- https://src.chromium.org/viewvc/blink?revision=157615&view=revision
- https://src.chromium.org/viewvc/blink?revision=157615&view=revision
Modified: 2024-11-21
CVE-2013-2911
Use-after-free vulnerability in the XSLStyleSheet::compileStyleSheet function in core/xml/XSLStyleSheetLibxslt.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of post-failure recompilation in unspecified libxslt versions.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=271939
- https://code.google.com/p/chromium/issues/detail?id=271939
- oval:org.mitre.oval:def:18687
- oval:org.mitre.oval:def:18687
- https://src.chromium.org/viewvc/blink?revision=156248&view=revision
- https://src.chromium.org/viewvc/blink?revision=156248&view=revision
Modified: 2024-11-21
CVE-2013-2912
Use-after-free vulnerability in the PepperInProcessRouter::SendToHost function in content/renderer/pepper/pepper_in_process_router.cc in the Pepper Plug-in API (PPAPI) in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a resource-destruction message.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=276368
- https://code.google.com/p/chromium/issues/detail?id=276368
- oval:org.mitre.oval:def:18962
- oval:org.mitre.oval:def:18962
- https://src.chromium.org/viewvc/chrome?revision=222614&view=revision
- https://src.chromium.org/viewvc/chrome?revision=222614&view=revision
Modified: 2024-11-21
CVE-2013-2913
Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=278908
- https://code.google.com/p/chromium/issues/detail?id=278908
- oval:org.mitre.oval:def:18843
- oval:org.mitre.oval:def:18843
- https://src.chromium.org/viewvc/blink?revision=157914&view=revision
- https://src.chromium.org/viewvc/blink?revision=157914&view=revision
Modified: 2024-11-21
CVE-2013-2915
Google Chrome before 30.0.1599.66 preserves pending NavigationEntry objects in certain invalid circumstances, which allows remote attackers to spoof the address bar via a URL with a malformed scheme, as demonstrated by a nonexistent:12121 URL.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=280512
- https://code.google.com/p/chromium/issues/detail?id=280512
- oval:org.mitre.oval:def:18319
- oval:org.mitre.oval:def:18319
- https://src.chromium.org/viewvc/chrome?revision=222146&view=revision
- https://src.chromium.org/viewvc/chrome?revision=222146&view=revision
Modified: 2024-11-21
CVE-2013-2916
Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to spoof the address bar via vectors involving a response with a 204 (aka No Content) status code, in conjunction with a delay in notifying the user of an attempted spoof.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=281256
- https://code.google.com/p/chromium/issues/detail?id=281256
- oval:org.mitre.oval:def:18968
- oval:org.mitre.oval:def:18968
- https://src.chromium.org/viewvc/blink?revision=157196&view=revision
- https://src.chromium.org/viewvc/blink?revision=157196&view=revision
Modified: 2024-11-21
CVE-2013-2917
The ReverbConvolverStage::ReverbConvolverStage function in core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the impulseResponse array.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=281480
- https://code.google.com/p/chromium/issues/detail?id=281480
- oval:org.mitre.oval:def:18820
- oval:org.mitre.oval:def:18820
- https://src.chromium.org/viewvc/blink?revision=157007&view=revision
- https://src.chromium.org/viewvc/blink?revision=157007&view=revision
Modified: 2024-11-21
CVE-2013-2918
Use-after-free vulnerability in the RenderBlock::collapseAnonymousBlockChild function in core/rendering/RenderBlock.cpp in the DOM implementation in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect handling of parent-child relationships for anonymous blocks.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=282088
- https://code.google.com/p/chromium/issues/detail?id=282088
- oval:org.mitre.oval:def:18839
- oval:org.mitre.oval:def:18839
- https://src.chromium.org/viewvc/blink?revision=157392&view=revision
- https://src.chromium.org/viewvc/blink?revision=157392&view=revision
Modified: 2024-11-21
CVE-2013-2919
Google V8, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=282736
- https://code.google.com/p/chromium/issues/detail?id=282736
- oval:org.mitre.oval:def:18840
- oval:org.mitre.oval:def:18840
Modified: 2024-11-21
CVE-2013-2920
The DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome before 30.0.1599.66 allows remote attackers to cause a denial of service (out-of-bounds read) via a relative URL containing a hostname, as demonstrated by a protocol-relative URL beginning with a //www.google.com/ substring.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=285742
- https://code.google.com/p/chromium/issues/detail?id=285742
- oval:org.mitre.oval:def:18451
- oval:org.mitre.oval:def:18451
- https://src.chromium.org/viewvc/chrome?revision=223735&view=revision
- https://src.chromium.org/viewvc/chrome?revision=223735&view=revision
Modified: 2024-11-21
CVE-2013-2921
Double free vulnerability in the ResourceFetcher::didLoadResource function in core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering certain callback processing during the reporting of a resource entry.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=286414
- https://code.google.com/p/chromium/issues/detail?id=286414
- oval:org.mitre.oval:def:18389
- oval:org.mitre.oval:def:18389
- https://src.chromium.org/viewvc/blink?revision=157760&view=revision
- https://src.chromium.org/viewvc/blink?revision=157760&view=revision
Modified: 2024-11-21
CVE-2013-2922
Use-after-free vulnerability in core/html/HTMLTemplateElement.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that operates on a TEMPLATE element.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=286975
- https://code.google.com/p/chromium/issues/detail?id=286975
- oval:org.mitre.oval:def:18358
- oval:org.mitre.oval:def:18358
- https://src.chromium.org/viewvc/blink?revision=157543&view=revision
- https://src.chromium.org/viewvc/blink?revision=157543&view=revision
Modified: 2024-11-21
CVE-2013-2923
Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.66 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=237800
- https://code.google.com/p/chromium/issues/detail?id=237800
- https://code.google.com/p/chromium/issues/detail?id=246724
- https://code.google.com/p/chromium/issues/detail?id=246724
- https://code.google.com/p/chromium/issues/detail?id=254728
- https://code.google.com/p/chromium/issues/detail?id=254728
- https://code.google.com/p/chromium/issues/detail?id=257852
- https://code.google.com/p/chromium/issues/detail?id=257852
- https://code.google.com/p/chromium/issues/detail?id=260138
- https://code.google.com/p/chromium/issues/detail?id=260138
- https://code.google.com/p/chromium/issues/detail?id=264211
- https://code.google.com/p/chromium/issues/detail?id=264211
- https://code.google.com/p/chromium/issues/detail?id=265493
- https://code.google.com/p/chromium/issues/detail?id=265493
- https://code.google.com/p/chromium/issues/detail?id=265731
- https://code.google.com/p/chromium/issues/detail?id=265731
- https://code.google.com/p/chromium/issues/detail?id=266593
- https://code.google.com/p/chromium/issues/detail?id=266593
- https://code.google.com/p/chromium/issues/detail?id=267068
- https://code.google.com/p/chromium/issues/detail?id=267068
- https://code.google.com/p/chromium/issues/detail?id=269835
- https://code.google.com/p/chromium/issues/detail?id=269835
- https://code.google.com/p/chromium/issues/detail?id=274020
- https://code.google.com/p/chromium/issues/detail?id=274020
- https://code.google.com/p/chromium/issues/detail?id=276111
- https://code.google.com/p/chromium/issues/detail?id=276111
- https://code.google.com/p/chromium/issues/detail?id=277656
- https://code.google.com/p/chromium/issues/detail?id=277656
- https://code.google.com/p/chromium/issues/detail?id=278366
- https://code.google.com/p/chromium/issues/detail?id=278366
- https://code.google.com/p/chromium/issues/detail?id=279286
- https://code.google.com/p/chromium/issues/detail?id=279286
- https://code.google.com/p/chromium/issues/detail?id=284792
- https://code.google.com/p/chromium/issues/detail?id=284792
- https://code.google.com/p/chromium/issues/detail?id=285380
- https://code.google.com/p/chromium/issues/detail?id=285380
- https://code.google.com/p/chromium/issues/detail?id=288761
- https://code.google.com/p/chromium/issues/detail?id=288761
- https://code.google.com/p/chromium/issues/detail?id=288771
- https://code.google.com/p/chromium/issues/detail?id=288771
- https://code.google.com/p/chromium/issues/detail?id=289648
- https://code.google.com/p/chromium/issues/detail?id=289648
- https://code.google.com/p/chromium/issues/detail?id=293521
- https://code.google.com/p/chromium/issues/detail?id=293521
- https://code.google.com/p/chromium/issues/detail?id=294023
- https://code.google.com/p/chromium/issues/detail?id=294023
- https://code.google.com/p/chromium/issues/detail?id=294202
- https://code.google.com/p/chromium/issues/detail?id=294202
- https://code.google.com/p/chromium/issues/detail?id=294206
- https://code.google.com/p/chromium/issues/detail?id=294206
- https://code.google.com/p/chromium/issues/detail?id=299016
- https://code.google.com/p/chromium/issues/detail?id=299016
- oval:org.mitre.oval:def:18103
- oval:org.mitre.oval:def:18103
Modified: 2024-11-21
CVE-2013-2924
Use-after-free vulnerability in International Components for Unicode (ICU), as used in Google Chrome before 30.0.1599.66 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
- http://bugs.icu-project.org/trac/ticket/10318
- http://bugs.icu-project.org/trac/ticket/10318
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update.html
- JVN#85336306
- JVN#85336306
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1556
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- DSA-2786
- DSA-2786
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- 64758
- 64758
- https://code.google.com/p/chromium/issues/detail?id=275803
- https://code.google.com/p/chromium/issues/detail?id=275803
- oval:org.mitre.oval:def:19017
- oval:org.mitre.oval:def:19017
- https://src.chromium.org/viewvc/chrome?revision=219151&view=revision
- https://src.chromium.org/viewvc/chrome?revision=219151&view=revision
Modified: 2024-11-21
CVE-2013-2925
Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object.
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=292422
- https://code.google.com/p/chromium/issues/detail?id=292422
- oval:org.mitre.oval:def:18866
- oval:org.mitre.oval:def:18866
- https://src.chromium.org/viewvc/blink?revision=158146&view=revision
- https://src.chromium.org/viewvc/blink?revision=158146&view=revision
Modified: 2024-11-21
CVE-2013-2926
Use-after-free vulnerability in the IndentOutdentCommand::tryIndentingAsListItem function in core/editing/IndentOutdentCommand.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to list elements.
- APPLE-SA-2014-04-01-1
- APPLE-SA-2014-04-01-1
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=294456
- https://code.google.com/p/chromium/issues/detail?id=294456
- oval:org.mitre.oval:def:18837
- oval:org.mitre.oval:def:18837
- https://src.chromium.org/viewvc/blink?revision=158727&view=revision
- https://src.chromium.org/viewvc/blink?revision=158727&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2927
Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements.
- APPLE-SA-2014-05-21-1
- APPLE-SA-2014-05-21-1
- APPLE-SA-2014-06-30-3
- APPLE-SA-2014-06-30-3
- APPLE-SA-2014-06-30-4
- APPLE-SA-2014-06-30-4
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6254
- http://support.apple.com/kb/HT6254
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=297478
- https://code.google.com/p/chromium/issues/detail?id=297478
- oval:org.mitre.oval:def:19155
- oval:org.mitre.oval:def:19155
- https://src.chromium.org/viewvc/blink?revision=158428&view=revision
- https://src.chromium.org/viewvc/blink?revision=158428&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2928
Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- APPLE-SA-2014-04-01-1
- APPLE-SA-2014-04-01-1
- http://crbug.com/303657
- http://crbug.com/303657
- http://crbug.com/303772
- http://crbug.com/303772
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1729
- openSUSE-SU-2013:1729
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2785
- DSA-2785
- https://code.google.com/p/chromium/issues/detail?id=305790
- https://code.google.com/p/chromium/issues/detail?id=305790
- oval:org.mitre.oval:def:19065
- oval:org.mitre.oval:def:19065
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-2931
Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=263255
- https://code.google.com/p/chromium/issues/detail?id=263255
- https://code.google.com/p/chromium/issues/detail?id=264574
- https://code.google.com/p/chromium/issues/detail?id=264574
- https://code.google.com/p/chromium/issues/detail?id=271235
- https://code.google.com/p/chromium/issues/detail?id=271235
- https://code.google.com/p/chromium/issues/detail?id=282738
- https://code.google.com/p/chromium/issues/detail?id=282738
- https://code.google.com/p/chromium/issues/detail?id=285578
- https://code.google.com/p/chromium/issues/detail?id=285578
- https://code.google.com/p/chromium/issues/detail?id=286368
- https://code.google.com/p/chromium/issues/detail?id=286368
- https://code.google.com/p/chromium/issues/detail?id=296276
- https://code.google.com/p/chromium/issues/detail?id=296276
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/chromium/issues/detail?id=297556
- https://code.google.com/p/chromium/issues/detail?id=297556
- https://code.google.com/p/chromium/issues/detail?id=299835
- https://code.google.com/p/chromium/issues/detail?id=299835
- https://code.google.com/p/chromium/issues/detail?id=299993
- https://code.google.com/p/chromium/issues/detail?id=299993
- https://code.google.com/p/chromium/issues/detail?id=302810
- https://code.google.com/p/chromium/issues/detail?id=302810
- https://code.google.com/p/chromium/issues/detail?id=303232
- https://code.google.com/p/chromium/issues/detail?id=303232
- https://code.google.com/p/chromium/issues/detail?id=304226
- https://code.google.com/p/chromium/issues/detail?id=304226
- https://code.google.com/p/chromium/issues/detail?id=306255
- https://code.google.com/p/chromium/issues/detail?id=306255
- https://code.google.com/p/chromium/issues/detail?id=314225
- https://code.google.com/p/chromium/issues/detail?id=314225
- https://code.google.com/p/chromium/issues/detail?id=315823
- https://code.google.com/p/chromium/issues/detail?id=315823
- oval:org.mitre.oval:def:19183
- oval:org.mitre.oval:def:19183
Modified: 2024-11-21
CVE-2013-6621
Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the x-webkit-speech attribute in a text INPUT element.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=268565
- https://code.google.com/p/chromium/issues/detail?id=268565
- oval:org.mitre.oval:def:19006
- oval:org.mitre.oval:def:19006
Modified: 2024-11-21
CVE-2013-6622
Use-after-free vulnerability in the HTMLMediaElement::didMoveToNewDocument function in core/html/HTMLMediaElement.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the movement of a media element between documents.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=272786
- https://code.google.com/p/chromium/issues/detail?id=272786
- oval:org.mitre.oval:def:18335
- oval:org.mitre.oval:def:18335
- https://src.chromium.org/viewvc/blink?revision=159031&view=revision
- https://src.chromium.org/viewvc/blink?revision=159031&view=revision
Modified: 2024-11-21
CVE-2013-6623
The SVG implementation in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service (out-of-bounds read) by leveraging the use of tree order, rather than transitive dependency order, for layout.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=282925
- https://code.google.com/p/chromium/issues/detail?id=282925
- oval:org.mitre.oval:def:19311
- oval:org.mitre.oval:def:19311
- https://src.chromium.org/viewvc/blink?revision=158480&view=revision
- https://src.chromium.org/viewvc/blink?revision=158480&view=revision
Modified: 2024-11-21
CVE-2013-6624
Use-after-free vulnerability in Google Chrome before 31.0.1650.48 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the string values of id attributes.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=290566
- https://code.google.com/p/chromium/issues/detail?id=290566
- oval:org.mitre.oval:def:19168
- oval:org.mitre.oval:def:19168
Modified: 2024-11-21
CVE-2013-6625
Use-after-free vulnerability in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 31.0.1650.48, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of DOM range objects in circumstances that require child node removal after a (1) mutation or (2) blur event.
- APPLE-SA-2014-04-01-1
- APPLE-SA-2014-04-01-1
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=295010
- https://code.google.com/p/chromium/issues/detail?id=295010
- oval:org.mitre.oval:def:19257
- oval:org.mitre.oval:def:19257
- https://src.chromium.org/viewvc/blink?revision=160037&view=revision
- https://src.chromium.org/viewvc/blink?revision=160037&view=revision
- https://support.apple.com/kb/HT6537
- https://support.apple.com/kb/HT6537
Modified: 2024-11-21
CVE-2013-6626
The WebContentsImpl::AttachInterstitialPage function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 31.0.1650.48 does not cancel JavaScript dialogs upon generating an interstitial warning, which allows remote attackers to spoof the address bar via a crafted web site.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=295695
- https://code.google.com/p/chromium/issues/detail?id=295695
- oval:org.mitre.oval:def:18401
- oval:org.mitre.oval:def:18401
- https://src.chromium.org/viewvc/chrome?revision=225026&view=revision
- https://src.chromium.org/viewvc/chrome?revision=225026&view=revision
Modified: 2024-11-21
CVE-2013-6627
net/http/http_stream_parser.cc in Google Chrome before 31.0.1650.48 does not properly process HTTP Informational (aka 1xx) status codes, which allows remote web servers to cause a denial of service (out-of-bounds read) via a crafted response.
- http://blog.skylined.nl/20161219001.html
- http://blog.skylined.nl/20161219001.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html
- http://packetstormsecurity.com/files/140209/Chrome-HTTP-1xx-Out-Of-Bounds-Read.html
- 20161219 CVE-2013-6627: Chrome Chrome HTTP 1xx base::StringTokenizerT<...>::QuickGetNext OOBR
- 20161219 CVE-2013-6627: Chrome Chrome HTTP 1xx base::StringTokenizerT<...>::QuickGetNext OOBR
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=299892
- https://code.google.com/p/chromium/issues/detail?id=299892
- oval:org.mitre.oval:def:19113
- oval:org.mitre.oval:def:19113
- https://src.chromium.org/viewvc/chrome?revision=226539&view=revision
- https://src.chromium.org/viewvc/chrome?revision=226539&view=revision
- 40944
- 40944
Modified: 2024-11-21
CVE-2013-6628
net/socket/ssl_client_socket_nss.cc in the TLS implementation in Google Chrome before 31.0.1650.48 does not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which might allow remote web servers to interfere with trust relationships by renegotiating a session.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=306959
- https://code.google.com/p/chromium/issues/detail?id=306959
- oval:org.mitre.oval:def:19108
- oval:org.mitre.oval:def:19108
- https://secure-resumption.com/
- https://secure-resumption.com/
- https://src.chromium.org/viewvc/chrome?revision=229611&view=revision
- https://src.chromium.org/viewvc/chrome?revision=229611&view=revision
Modified: 2024-11-21
CVE-2013-6629
The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
- http://advisories.mageia.org/MGASA-2013-0333.html
- http://advisories.mageia.org/MGASA-2013-0333.html
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- http://bugs.ghostscript.com/show_bug.cgi?id=686980
- http://bugs.ghostscript.com/show_bug.cgi?id=686980
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- HPSBUX03091
- HPSBUX03091
- SSRT101667
- SSRT101667
- HPSBUX03092
- HPSBUX03092
- SSRT101668
- SSRT101668
- RHSA-2013:1803
- RHSA-2013:1803
- RHSA-2013:1804
- RHSA-2013:1804
- 56175
- 56175
- 58974
- 58974
- 59058
- 59058
- GLSA-201406-32
- GLSA-201406-32
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6150
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6162
- http://support.apple.com/kb/HT6163
- http://support.apple.com/kb/HT6163
- DSA-2799
- DSA-2799
- MDVSA-2013:273
- MDVSA-2013:273
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- 63676
- 63676
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- USN-2060-1
- USN-2060-1
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21672080
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- http://www-01.ibm.com/support/docview.wss?uid=swg21676746
- RHSA-2014:0413
- RHSA-2014:0413
- RHSA-2014:0414
- RHSA-2014:0414
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://code.google.com/p/chromium/issues/detail?id=258723
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2013-6629
- GLSA-201606-03
- GLSA-201606-03
- https://src.chromium.org/viewvc/chrome?revision=229729&view=revision
- https://src.chromium.org/viewvc/chrome?revision=229729&view=revision
- https://www.ibm.com/support/docview.wss?uid=swg21675973
- https://www.ibm.com/support/docview.wss?uid=swg21675973
Modified: 2024-11-21
CVE-2013-6630
The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
- http://advisories.mageia.org/MGASA-2013-0333.html
- http://advisories.mageia.org/MGASA-2013-0333.html
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- 20131112 bugs in IJG jpeg6b & libjpeg-turbo
- http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git%3Ba=commit%3Bh=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8
- http://git.chromium.org/gitweb/?p=chromium/deps/libjpeg_turbo.git%3Ba=commit%3Bh=32cab49bd4cb1ce069a435fd75f9439c34ddc6f8
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- FEDORA-2013-23127
- FEDORA-2013-23127
- FEDORA-2013-23295
- FEDORA-2013-23295
- FEDORA-2013-23519
- FEDORA-2013-23519
- FEDORA-2013-23291
- FEDORA-2013-23291
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1916
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1917
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1918
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1957
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1958
- openSUSE-SU-2013:1959
- openSUSE-SU-2013:1959
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0008
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- RHSA-2013:1803
- RHSA-2013:1803
- 56175
- 56175
- DSA-2799
- DSA-2799
- MDVSA-2013:273
- MDVSA-2013:273
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-116.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1029470
- 1029470
- 1029476
- 1029476
- USN-2052-1
- USN-2052-1
- USN-2053-1
- USN-2053-1
- USN-2060-1
- USN-2060-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://bugzilla.mozilla.org/show_bug.cgi?id=891693
- https://code.google.com/p/chromium/issues/detail?id=299835
- https://code.google.com/p/chromium/issues/detail?id=299835
- GLSA-201606-03
- GLSA-201606-03
Modified: 2024-11-21
CVE-2013-6631
Use-after-free vulnerability in the Channel::SendRTCPPacket function in voice_engine/channel.cc in libjingle in WebRTC, as used in Google Chrome before 31.0.1650.48 and other products, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors that trigger the absence of certain statistics initialization, leading to the skipping of a required DeRegisterExternalTransport call.
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/chromium/issues/detail?id=296804
- https://code.google.com/p/webrtc/source/detail?r=4827
- https://code.google.com/p/webrtc/source/detail?r=4827
- https://webrtc-codereview.appspot.com/2275008
- https://webrtc-codereview.appspot.com/2275008
Modified: 2024-11-21
CVE-2013-6632
Integer overflow in Google Chrome before 31.0.1650.57 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013.
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- http://googlechromereleases.blogspot.com/2013/11/stable-channel-update_14.html
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1776
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1777
- openSUSE-SU-2013:1861
- openSUSE-SU-2013:1861
- openSUSE-SU-2014:0065
- openSUSE-SU-2014:0065
- DSA-2799
- DSA-2799
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- http://www.hppwn2own.com/chrome-nexus-4-samsung-galaxy-s4-falls/
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319117
- https://code.google.com/p/chromium/issues/detail?id=319125
- https://code.google.com/p/chromium/issues/detail?id=319125
Modified: 2024-11-21
CVE-2019-15684
Kaspersky Protection extension for web browser Google Chrome prior to 30.112.62.0 was vulnerable to unauthorized access to its features remotely that could lead to removing other installed extensions.