ALT-PU-2015-1756-1
Closed vulnerabilities
BDU:2015-11275
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа или вызвать отказ в обслуживании
BDU:2015-11276
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2015-11277
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2015-11278
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11279
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11280
Уязвимость браузера Google Chrome, позволяющая нарушителю подменить значок SSL
BDU:2015-11281
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2015-11282
Уязвимость браузера Google Chrome, позволяющая нарушителю перенаправить пользователя на произвольный URL
BDU:2015-11283
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11284
Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2015-1291
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web site with crafted JavaScript code and IFRAME elements.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=516377
- https://code.google.com/p/chromium/issues/detail?id=516377
- GLSA-201603-09
- GLSA-201603-09
- https://src.chromium.org/viewvc/blink?revision=200098&view=revision
- https://src.chromium.org/viewvc/blink?revision=200098&view=revision
Modified: 2024-11-21
CVE-2015-1292
The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=522791
- https://code.google.com/p/chromium/issues/detail?id=522791
- https://codereview.chromium.org/1307883002/
- https://codereview.chromium.org/1307883002/
- GLSA-201603-09
- GLSA-201603-09
- https://src.chromium.org/viewvc/blink?revision=201055&view=revision
- https://src.chromium.org/viewvc/blink?revision=201055&view=revision
Modified: 2024-11-21
CVE-2015-1293
The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=524074
- https://code.google.com/p/chromium/issues/detail?id=524074
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2015-1294
Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an infinite result during an inversion calculation.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=492263
- https://code.google.com/p/chromium/issues/detail?id=492263
- https://codereview.chromium.org/1188433011/
- https://codereview.chromium.org/1188433011/
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2015-1295
Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC messages during preparation for printing, as demonstrated by messages associated with PDF documents in conjunction with messages about printer capabilities.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=502562
- https://code.google.com/p/chromium/issues/detail?id=502562
- https://codereview.chromium.org/1228693002/
- https://codereview.chromium.org/1228693002/
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2015-1296
The UnescapeURLWithAdjustmentsImpl implementation in net/base/escape.cc in Google Chrome before 45.0.2454.85 does not prevent display of Unicode LOCK characters in the omnibox, which makes it easier for remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL, as demonstrated by the omnibox in localizations for right-to-left languages.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=421332
- https://code.google.com/p/chromium/issues/detail?id=421332
- https://codereview.chromium.org/1180393003/
- https://codereview.chromium.org/1180393003/
- https://codereview.chromium.org/1189553002/
- https://codereview.chromium.org/1189553002/
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2015-1297
The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request's source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=510802
- https://code.google.com/p/chromium/issues/detail?id=510802
- https://codereview.chromium.org/1267183003/
- https://codereview.chromium.org/1267183003/
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2015-1298
The RuntimeEventRouter::OnExtensionUninstalled function in extensions/browser/api/runtime/runtime_api.cc in Google Chrome before 45.0.2454.85 does not ensure that the setUninstallURL preference corresponds to the URL of a web site, which allows user-assisted remote attackers to trigger access to an arbitrary URL via a crafted extension that is uninstalled.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=518827
- https://code.google.com/p/chromium/issues/detail?id=518827
- https://codereview.chromium.org/1282263002/
- https://codereview.chromium.org/1282263002/
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2015-1299
Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging erroneous timer firing, related to ThreadTimers.cpp and Timer.cpp.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=416362
- https://code.google.com/p/chromium/issues/detail?id=416362
- https://codereview.chromium.org/1153763005/
- https://codereview.chromium.org/1153763005/
- https://codereview.chromium.org/956333002/
- https://codereview.chromium.org/956333002/
- https://codereview.chromium.org/959263002/
- https://codereview.chromium.org/959263002/
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2015-1300
The FrameFetchContext::updateTimingInfoForIFrameNavigation function in core/loader/FrameFetchContext.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to obtain sensitive information via crafted JavaScript code that leverages a history.back call.
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1586
- openSUSE-SU-2015:1873
- openSUSE-SU-2015:1873
- RHSA-2015:1712
- RHSA-2015:1712
- DSA-3351
- DSA-3351
- 1033472
- 1033472
- https://code.google.com/p/chromium/issues/detail?id=511616
- https://code.google.com/p/chromium/issues/detail?id=511616
- https://github.com/w3c/resource-timing/issues/29
- https://github.com/w3c/resource-timing/issues/29
- GLSA-201603-09
- GLSA-201603-09
- https://src.chromium.org/viewvc/blink?revision=199553&view=revision
- https://src.chromium.org/viewvc/blink?revision=199553&view=revision