ALT-PU-2016-1283-1
Closed vulnerabilities
BDU:2015-12011
Уязвимости библиотеки libpng, позволяющие нарушителю вызвать отказ в обслуживании
BDU:2016-00641
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа
BDU:2016-00642
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа
BDU:2016-00643
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2016-00644
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00645
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00646
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00647
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти механизмы защиты целостности Subresource
BDU:2016-00648
Уязвимость браузера Google Chrome, позволяющая нарушителю получить конфиденциальную информацию
BDU:2016-00649
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2016-00650
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00651
Уязвимость браузера Google Chrome, позволяющая нарушителю повлиять на целостность информации
BDU:2016-00652
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00653
Уязвимости браузера Google Chrome, позволяющие нарушителю оказать другое воздействие или вызвать отказ в обслуживании
BDU:2016-00654
Уязвимости браузера Google Chrome и браузерного ядра V8, позволяющие нарушителю оказать другое воздействие или вызвать отказ в обслуживании
BDU:2016-00655
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00656
Уязвимость браузера Google Chrome, позволяющая нарушителю получить конфиденциальную информацию
BDU:2016-00768
Уязвимости браузера Google Chrome, позволяющие нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00769
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00770
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00907
Уязвимости браузерного движка V8, позволяющие нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00911
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00912
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00913
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00914
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00915
Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2015-8126
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- FEDORA-2015-5e52306c9c
- FEDORA-2015-5e52306c9c
- FEDORA-2015-1d87313b7c
- FEDORA-2015-1d87313b7c
- FEDORA-2015-ec2ddd15d7
- FEDORA-2015-ec2ddd15d7
- FEDORA-2015-501493d853
- FEDORA-2015-501493d853
- FEDORA-2015-13668fff74
- FEDORA-2015-13668fff74
- FEDORA-2015-97fc1797fa
- FEDORA-2015-97fc1797fa
- FEDORA-2015-8a1243db75
- FEDORA-2015-8a1243db75
- FEDORA-2016-9a1c707b10
- FEDORA-2016-9a1c707b10
- FEDORA-2016-43735c33a7
- FEDORA-2016-43735c33a7
- FEDORA-2015-c80ec85542
- FEDORA-2015-c80ec85542
- FEDORA-2015-233750b6ab
- FEDORA-2015-233750b6ab
- FEDORA-2015-4ad4998d00
- FEDORA-2015-4ad4998d00
- openSUSE-SU-2015:2099
- openSUSE-SU-2015:2099
- openSUSE-SU-2015:2100
- openSUSE-SU-2015:2100
- SUSE-SU-2016:0256
- SUSE-SU-2016:0256
- openSUSE-SU-2016:0263
- openSUSE-SU-2016:0263
- SUSE-SU-2016:0265
- SUSE-SU-2016:0265
- openSUSE-SU-2016:0268
- openSUSE-SU-2016:0268
- SUSE-SU-2016:0269
- SUSE-SU-2016:0269
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0279
- openSUSE-SU-2016:0279
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- openSUSE-SU-2015:2135
- openSUSE-SU-2015:2135
- openSUSE-SU-2015:2136
- openSUSE-SU-2015:2136
- openSUSE-SU-2015:2262
- openSUSE-SU-2015:2262
- openSUSE-SU-2015:2263
- openSUSE-SU-2015:2263
- openSUSE-SU-2016:0103
- openSUSE-SU-2016:0103
- openSUSE-SU-2016:0104
- openSUSE-SU-2016:0104
- openSUSE-SU-2016:0105
- openSUSE-SU-2016:0105
- RHSA-2015:2594
- RHSA-2015:2594
- RHSA-2015:2595
- RHSA-2015:2595
- RHSA-2015:2596
- RHSA-2015:2596
- RHSA-2016:0055
- RHSA-2016:0055
- RHSA-2016:0056
- RHSA-2016:0056
- RHSA-2016:0057
- RHSA-2016:0057
- DSA-3399
- DSA-3399
- DSA-3507
- DSA-3507
- [oss-security] 20151112 CVE request: libpng buffer overflow in png_set_PLTE
- [oss-security] 20151112 CVE request: libpng buffer overflow in png_set_PLTE
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77568
- 77568
- 1034142
- 1034142
- USN-2815-1
- USN-2815-1
- RHSA-2016:1430
- RHSA-2016:1430
- https://code.google.com/p/chromium/issues/detail?id=560291
- https://code.google.com/p/chromium/issues/detail?id=560291
- https://kc.mcafee.com/corporate/index?page=content&id=SB10148
- https://kc.mcafee.com/corporate/index?page=content&id=SB10148
- GLSA-201603-09
- GLSA-201603-09
- GLSA-201611-08
- GLSA-201611-08
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
Modified: 2024-11-21
CVE-2016-1630
The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://code.google.com/p/chromium/issues/detail?id=560011
- https://code.google.com/p/chromium/issues/detail?id=560011
- https://codereview.chromium.org/1464223002
- https://codereview.chromium.org/1464223002
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1631
The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://code.google.com/p/chromium/issues/detail?id=569496
- https://code.google.com/p/chromium/issues/detail?id=569496
- https://codereview.chromium.org/1559113002/
- https://codereview.chromium.org/1559113002/
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1632
The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- https://code.google.com/p/chromium/issues/detail?id=549986
- https://code.google.com/p/chromium/issues/detail?id=549986
- https://codereview.chromium.org/1433293004
- https://codereview.chromium.org/1433293004
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1633
Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://code.google.com/p/chromium/issues/detail?id=572537
- https://code.google.com/p/chromium/issues/detail?id=572537
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1634
Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://code.google.com/p/chromium/issues/detail?id=559292
- https://code.google.com/p/chromium/issues/detail?id=559292
- https://codereview.chromium.org/1556963002
- https://codereview.chromium.org/1556963002
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1635
extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- https://code.google.com/p/chromium/issues/detail?id=585268
- https://code.google.com/p/chromium/issues/detail?id=585268
- https://codereview.chromium.org/1684953002
- https://codereview.chromium.org/1684953002
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1636
The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://code.google.com/p/chromium/issues/detail?id=584155
- https://code.google.com/p/chromium/issues/detail?id=584155
- https://codereview.chromium.org/1713093002
- https://codereview.chromium.org/1713093002
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1637
The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://code.google.com/p/chromium/issues/detail?id=555544
- https://code.google.com/p/chromium/issues/detail?id=555544
- https://codereview.chromium.org/1506913002
- https://codereview.chromium.org/1506913002
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1638
extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- https://code.google.com/p/chromium/issues/detail?id=585282
- https://code.google.com/p/chromium/issues/detail?id=585282
- https://codereview.chromium.org/1744623002
- https://codereview.chromium.org/1744623002
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1639
Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- https://code.google.com/p/chromium/issues/detail?id=572224
- https://code.google.com/p/chromium/issues/detail?id=572224
- https://codereview.chromium.org/1703733002
- https://codereview.chromium.org/1703733002
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1640
The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user's next navigation target via a crafted web site.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- https://code.google.com/p/chromium/issues/detail?id=550047
- https://code.google.com/p/chromium/issues/detail?id=550047
- https://codereview.chromium.org/1496033003
- https://codereview.chromium.org/1496033003
- https://codereview.chromium.org/1554233005
- https://codereview.chromium.org/1554233005
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1641
Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://code.google.com/p/chromium/issues/detail?id=583718
- https://code.google.com/p/chromium/issues/detail?id=583718
- https://codereview.chromium.org/1730363003
- https://codereview.chromium.org/1730363003
- GLSA-201603-09
- GLSA-201603-09
Modified: 2024-11-21
CVE-2016-1642
Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- DSA-3507
- DSA-3507
- 84008
- 84008
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://bugs.chromium.org/p/chromium/issues/detail?id=472147
- https://bugs.chromium.org/p/chromium/issues/detail?id=472147
- https://bugs.chromium.org/p/chromium/issues/detail?id=563964
- https://bugs.chromium.org/p/chromium/issues/detail?id=563964
- https://bugs.chromium.org/p/chromium/issues/detail?id=565416
- https://bugs.chromium.org/p/chromium/issues/detail?id=565416
- https://bugs.chromium.org/p/chromium/issues/detail?id=565424
- https://bugs.chromium.org/p/chromium/issues/detail?id=565424
- https://bugs.chromium.org/p/chromium/issues/detail?id=582470
- https://bugs.chromium.org/p/chromium/issues/detail?id=582470
- https://bugs.chromium.org/p/chromium/issues/detail?id=582697
- https://bugs.chromium.org/p/chromium/issues/detail?id=582697
- https://bugs.chromium.org/p/chromium/issues/detail?id=582701
- https://bugs.chromium.org/p/chromium/issues/detail?id=582701
- https://bugs.chromium.org/p/chromium/issues/detail?id=582707
- https://bugs.chromium.org/p/chromium/issues/detail?id=582707
- https://bugs.chromium.org/p/chromium/issues/detail?id=589186
- https://bugs.chromium.org/p/chromium/issues/detail?id=589186
- https://code.google.com/p/chromium/issues/detail?id=591402
- https://code.google.com/p/chromium/issues/detail?id=591402
Modified: 2024-11-21
CVE-2016-1643
The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html
- openSUSE-SU-2016:0817
- openSUSE-SU-2016:0817
- openSUSE-SU-2016:0818
- openSUSE-SU-2016:0818
- openSUSE-SU-2016:0828
- openSUSE-SU-2016:0828
- DSA-3513
- DSA-3513
- 84224
- 84224
- 1035259
- 1035259
- USN-2920-1
- USN-2920-1
- https://code.google.com/p/chromium/issues/detail?id=589838
- https://code.google.com/p/chromium/issues/detail?id=589838
- https://codereview.chromium.org/1732753004
- https://codereview.chromium.org/1732753004
Modified: 2024-11-21
CVE-2016-1644
WebKit/Source/core/layout/LayoutObject.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly restrict relayout scheduling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted HTML document.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html
- openSUSE-SU-2016:0817
- openSUSE-SU-2016:0817
- openSUSE-SU-2016:0818
- openSUSE-SU-2016:0818
- openSUSE-SU-2016:0828
- openSUSE-SU-2016:0828
- DSA-3513
- DSA-3513
- 84224
- 84224
- 1035259
- 1035259
- USN-2920-1
- USN-2920-1
- https://code.google.com/p/chromium/issues/detail?id=590620
- https://code.google.com/p/chromium/issues/detail?id=590620
- https://codereview.chromium.org/1755543002
- https://codereview.chromium.org/1755543002
Modified: 2024-11-21
CVE-2016-1645
Multiple integer signedness errors in the opj_j2k_update_image_data function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 49.0.2623.87, allow remote attackers to cause a denial of service (incorrect cast and out-of-bounds write) or possibly have unspecified other impact via crafted JPEG 2000 data.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_8.html
- openSUSE-SU-2016:0817
- openSUSE-SU-2016:0817
- openSUSE-SU-2016:0818
- openSUSE-SU-2016:0818
- openSUSE-SU-2016:0828
- openSUSE-SU-2016:0828
- DSA-3513
- DSA-3513
- 84224
- 84224
- 1035259
- 1035259
- http://www.zerodayinitiative.com/advisories/ZDI-16-197/
- http://www.zerodayinitiative.com/advisories/ZDI-16-197/
- https://code.google.com/p/chromium/issues/detail?id=587227
- https://code.google.com/p/chromium/issues/detail?id=587227
- https://pdfium.googlesource.com/pdfium/+/c145aeb2bf13ac408fc3e8233acca43d4251bbdc
- https://pdfium.googlesource.com/pdfium/+/c145aeb2bf13ac408fc3e8233acca43d4251bbdc
Modified: 2025-03-06
CVE-2016-1646
The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:1059
- openSUSE-SU-2016:1059
- RHSA-2016:0525
- RHSA-2016:0525
- DSA-3531
- DSA-3531
- 1035423
- 1035423
- USN-2955-1
- USN-2955-1
- https://code.google.com/p/chromium/issues/detail?id=594574
- https://code.google.com/p/chromium/issues/detail?id=594574
- https://codereview.chromium.org/1804963002/
- https://codereview.chromium.org/1804963002/
- GLSA-201605-02
- GLSA-201605-02
Modified: 2024-11-21
CVE-2016-1647
Use-after-free vulnerability in the RenderWidgetHostImpl::Destroy function in content/browser/renderer_host/render_widget_host_impl.cc in the Navigation implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:1059
- openSUSE-SU-2016:1059
- RHSA-2016:0525
- RHSA-2016:0525
- DSA-3531
- DSA-3531
- 1035423
- 1035423
- USN-2955-1
- USN-2955-1
- https://code.google.com/p/chromium/issues/detail?id=590284
- https://code.google.com/p/chromium/issues/detail?id=590284
- https://codereview.chromium.org/1747183002/
- https://codereview.chromium.org/1747183002/
- https://codereview.chromium.org/1811783002/
- https://codereview.chromium.org/1811783002/
- GLSA-201605-02
- GLSA-201605-02
Modified: 2024-11-21
CVE-2016-1648
Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:1059
- openSUSE-SU-2016:1059
- RHSA-2016:0525
- RHSA-2016:0525
- DSA-3531
- DSA-3531
- 1035423
- 1035423
- https://code.google.com/p/chromium/issues/detail?id=590455
- https://code.google.com/p/chromium/issues/detail?id=590455
- https://codereview.chromium.org/1751553002/
- https://codereview.chromium.org/1751553002/
- GLSA-201605-02
- GLSA-201605-02
Modified: 2024-11-21
CVE-2016-1649
The Program::getUniformInternal function in Program.cpp in libANGLE, as used in Google Chrome before 49.0.2623.108, does not properly handle a certain data-type mismatch, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted shader stages.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:1059
- openSUSE-SU-2016:1059
- RHSA-2016:0525
- RHSA-2016:0525
- DSA-3531
- DSA-3531
- 1035423
- 1035423
- USN-2955-1
- USN-2955-1
- http://www.zerodayinitiative.com/advisories/ZDI-16-224
- http://www.zerodayinitiative.com/advisories/ZDI-16-224
- https://chromium-review.googlesource.com/334448
- https://chromium-review.googlesource.com/334448
- https://code.google.com/p/chromium/issues/detail?id=595836
- https://code.google.com/p/chromium/issues/detail?id=595836
- GLSA-201605-02
- GLSA-201605-02
Modified: 2024-11-21
CVE-2016-1650
The PageCaptureSaveAsMHTMLFunction::ReturnFailure function in browser/extensions/api/page_capture/page_capture_api.cc in Google Chrome before 49.0.2623.108 allows attackers to cause a denial of service or possibly have unspecified other impact by triggering an error in creating an MHTML document.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:1059
- openSUSE-SU-2016:1059
- RHSA-2016:0525
- RHSA-2016:0525
- DSA-3531
- DSA-3531
- 1035423
- 1035423
- https://bugs.chromium.org/p/chromium/issues/detail?id=401364
- https://bugs.chromium.org/p/chromium/issues/detail?id=401364
- https://code.google.com/p/chromium/issues/detail?id=597518
- https://code.google.com/p/chromium/issues/detail?id=597518
- https://codereview.chromium.org/1761303003/
- https://codereview.chromium.org/1761303003/
- GLSA-201605-02
- GLSA-201605-02
Modified: 2024-11-21
CVE-2016-2843
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Modified: 2024-11-21
CVE-2016-2844
WebKit/Source/core/layout/LayoutBlock.cpp in Blink, as used in Google Chrome before 49.0.2623.75, does not properly determine when anonymous block wrappers may exist, which allows remote attackers to cause a denial of service (incorrect cast and assertion failure) or possibly have unspecified other impact via crafted JavaScript code.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- 84170
- 84170
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://bugs.chromium.org/p/chromium/issues/detail?id=546849
- https://bugs.chromium.org/p/chromium/issues/detail?id=546849
- https://code.google.com/p/chromium/issues/detail?id=591402
- https://code.google.com/p/chromium/issues/detail?id=591402
- https://codereview.chromium.org/1423573002
- https://codereview.chromium.org/1423573002
Modified: 2024-11-21
CVE-2016-2845
The Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 49.0.2623.75, does not ignore a URL's path component in the case of a ServiceWorker fetch, which allows remote attackers to obtain sensitive information about visited web pages by reading CSP violation reports, related to FrameFetchContext.cpp and ResourceFetcher.cpp.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html
- http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html
- 84168
- 84168
- 1035185
- 1035185
- USN-2920-1
- USN-2920-1
- https://bugs.chromium.org/p/chromium/issues/detail?id=542060
- https://bugs.chromium.org/p/chromium/issues/detail?id=542060
- https://code.google.com/p/chromium/issues/detail?id=591402
- https://code.google.com/p/chromium/issues/detail?id=591402
- https://codereview.chromium.org/1454003003/
- https://codereview.chromium.org/1454003003/
Modified: 2024-11-21
CVE-2016-3679
Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0929
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:0930
- openSUSE-SU-2016:1059
- openSUSE-SU-2016:1059
- RHSA-2016:0525
- RHSA-2016:0525
- 1035423
- 1035423
- USN-2955-1
- USN-2955-1