2024-06-28 13:17:52 +00:00

926 lines
47 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20151729",
"Version": "oval:org.altlinux.errata:def:20151729",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2015-1729: package `chromium` update to version 44.0.2403.157-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2015-1729",
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1729",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-10875",
"RefURL": "https://bdu.fstec.ru/vul/2015-10875",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10876",
"RefURL": "https://bdu.fstec.ru/vul/2015-10876",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10877",
"RefURL": "https://bdu.fstec.ru/vul/2015-10877",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10878",
"RefURL": "https://bdu.fstec.ru/vul/2015-10878",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10879",
"RefURL": "https://bdu.fstec.ru/vul/2015-10879",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10880",
"RefURL": "https://bdu.fstec.ru/vul/2015-10880",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10881",
"RefURL": "https://bdu.fstec.ru/vul/2015-10881",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11018",
"RefURL": "https://bdu.fstec.ru/vul/2015-11018",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11019",
"RefURL": "https://bdu.fstec.ru/vul/2015-11019",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11020",
"RefURL": "https://bdu.fstec.ru/vul/2015-11020",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11021",
"RefURL": "https://bdu.fstec.ru/vul/2015-11021",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11027",
"RefURL": "https://bdu.fstec.ru/vul/2015-11027",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11275",
"RefURL": "https://bdu.fstec.ru/vul/2015-11275",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11276",
"RefURL": "https://bdu.fstec.ru/vul/2015-11276",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11277",
"RefURL": "https://bdu.fstec.ru/vul/2015-11277",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11278",
"RefURL": "https://bdu.fstec.ru/vul/2015-11278",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11279",
"RefURL": "https://bdu.fstec.ru/vul/2015-11279",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11280",
"RefURL": "https://bdu.fstec.ru/vul/2015-11280",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11281",
"RefURL": "https://bdu.fstec.ru/vul/2015-11281",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11282",
"RefURL": "https://bdu.fstec.ru/vul/2015-11282",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11283",
"RefURL": "https://bdu.fstec.ru/vul/2015-11283",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11284",
"RefURL": "https://bdu.fstec.ru/vul/2015-11284",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11285",
"RefURL": "https://bdu.fstec.ru/vul/2015-11285",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11330",
"RefURL": "https://bdu.fstec.ru/vul/2015-11330",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11331",
"RefURL": "https://bdu.fstec.ru/vul/2015-11331",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11332",
"RefURL": "https://bdu.fstec.ru/vul/2015-11332",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11333",
"RefURL": "https://bdu.fstec.ru/vul/2015-11333",
"Source": "BDU"
},
{
"RefID": "CVE-2015-1270",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1270",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1271",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1271",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1272",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1272",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1273",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1273",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1274",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1274",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1276",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1276",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1277",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1277",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1278",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1278",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1279",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1279",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1280",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1280",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1281",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1281",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1282",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1282",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1283",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1283",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1284",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1284",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1285",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1285",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1286",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1286",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1287",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1287",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1288",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1288",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1289",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1289",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1290",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1290",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1291",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1291",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1292",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1292",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1293",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1293",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1294",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1294",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1295",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1295",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1296",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1296",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1297",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1297",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1298",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1298",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1299",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1299",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1300",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1300",
"Source": "CVE"
},
{
"RefID": "CVE-2015-1301",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1301",
"Source": "CVE"
},
{
"RefID": "CVE-2015-5605",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-5605",
"Source": "CVE"
},
{
"RefID": "CVE-2015-6580",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6580",
"Source": "CVE"
},
{
"RefID": "CVE-2015-6581",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6581",
"Source": "CVE"
},
{
"RefID": "CVE-2015-6582",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6582",
"Source": "CVE"
},
{
"RefID": "CVE-2015-6583",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6583",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 44.0.2403.157-alt1. \nSecurity Fix(es):\n\n * BDU:2015-10875: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10876: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10877: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10878: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10879: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10880: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10881: Уязвимости браузера Google Chrome, позволяющие нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11018: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11019: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11020: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11021: Уязвимость браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11027: Уязвимость операционной системы Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11275: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа или вызвать отказ в обслуживании\n\n * BDU:2015-11276: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа\n\n * BDU:2015-11277: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа\n\n * BDU:2015-11278: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11279: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11280: Уязвимость браузера Google Chrome, позволяющая нарушителю подменить значок SSL\n\n * BDU:2015-11281: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа\n\n * BDU:2015-11282: Уязвимость браузера Google Chrome, позволяющая нарушителю перенаправить пользователя на произвольный URL\n\n * BDU:2015-11283: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11284: Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2015-11285: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11330: Уязвимости браузера Google Chrome, позволяющие нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11331: Уязвимость браузера Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-11332: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11333: Уязвимость браузера Google Chrome, позволяющая нарушителю подменить содержимое окна браузера\n\n * CVE-2015-1270: The ucnv_io_getConverterName function in common/ucnv_io.cpp in International Components for Unicode (ICU), as used in Google Chrome before 44.0.2403.89, mishandles converter names with initial x- substrings, which allows remote attackers to cause a denial of service (read of uninitialized memory) or possibly have unspecified other impact via a crafted file.\n\n * CVE-2015-1271: PDFium, as used in Google Chrome before 44.0.2403.89, does not properly handle certain out-of-memory conditions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted PDF document that triggers a large memory allocation.\n\n * CVE-2015-1272: Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.\n\n * CVE-2015-1273: Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid JPEG2000 data in a PDF document.\n\n * CVE-2015-1274: Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous \"Always open files of this type\" choice, related to download_commands.cc and download_prefs.cc.\n\n * CVE-2015-1276: Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the IndexedDB implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an abort action before a certain write operation.\n\n * CVE-2015-1277: Use-after-free vulnerability in the accessibility implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging lack of certain validity checks for accessibility-tree data structures.\n\n * CVE-2015-1278: content/browser/web_contents/web_contents_impl.cc in Google Chrome before 44.0.2403.89 does not ensure that a PDF document's modal dialog is closed upon navigation to an interstitial page, which allows remote attackers to spoof URLs via a crafted document, as demonstrated by the alert_dialog.pdf document.\n\n * CVE-2015-1279: Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.\n\n * CVE-2015-1280: SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging access to a renderer process and providing crafted serialized data.\n\n * CVE-2015-1281: core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly determine the V8 context of a microtask, which allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image from an unintended source.\n\n * CVE-2015-1282: Multiple use-after-free vulnerabilities in fpdfsdk/src/javascript/Document.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to the (1) Document::delay and (2) Document::DoFieldDelay functions.\n\n * CVE-2015-1283: Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.\n\n * CVE-2015-1284: The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page's maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements.\n\n * CVE-2015-1285: The XSSAuditor::canonicalize function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 44.0.2403.89, does not properly choose a truncation point, which makes it easier for remote attackers to obtain sensitive information via an unspecified linear-time attack.\n\n * CVE-2015-1286: Cross-site scripting (XSS) vulnerability in the V8ContextNativeHandler::GetModuleSystem function in extensions/renderer/v8_context_native_handler.cc in Google Chrome before 44.0.2403.89 allows remote attackers to inject arbitrary web script or HTML by leveraging the lack of a certain V8 context restriction, aka a Blink \"Universal XSS (UXSS).\"\n\n * CVE-2015-1287: Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to core/fetch/CSSStyleSheetResource.cpp.\n\n * CVE-2015-1288: The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.\n\n * CVE-2015-1289: Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-1290: The Google V8 engine, as used in Google Chrome before 44.0.2403.89 and QtWebEngineCore in Qt before 5.5.1, allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a crafted web site.\n\n * CVE-2015-1291: The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web site with crafted JavaScript code and IFRAME elements.\n\n * CVE-2015-1292: The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.\n\n * CVE-2015-1293: The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.\n\n * CVE-2015-1294: Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an infinite result during an inversion calculation.\n\n * CVE-2015-1295: Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC messages during preparation for printing, as demonstrated by messages associated with PDF documents in conjunction with messages about printer capabilities.\n\n * CVE-2015-1296: The UnescapeURLWithAdjustmentsImpl implementation in net/base/escape.cc in Google Chrome before 45.0.2454.85 does not prevent display of Unicode LOCK characters in the omnibox, which makes it easier for remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL, as demonstrated by the omnibox in localizations for right-to-left languages.\n\n * CVE-2015-1297: The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request's source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension.\n\n * CVE-2015-1298: The RuntimeEventRouter::OnExtensionUninstalled function in extensions/browser/api/runtime/runtime_api.cc in Google Chrome before 45.0.2454.85 does not ensure that the setUninstallURL preference corresponds to the URL of a web site, which allows user-assisted remote attackers to trigger access to an arbitrary URL via a crafted extension that is uninstalled.\n\n * CVE-2015-1299: Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging erroneous timer firing, related to ThreadTimers.cpp and Timer.cpp.\n\n * CVE-2015-1300: The FrameFetchContext::updateTimingInfoForIFrameNavigation function in core/loader/FrameFetchContext.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to obtain sensitive information via crafted JavaScript code that leverages a history.back call.\n\n * CVE-2015-1301: Multiple unspecified vulnerabilities in Google Chrome before 45.0.2454.85 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-5605: The regular-expression implementation in Google V8, as used in Google Chrome before 44.0.2403.89, mishandles interrupts, which allows remote attackers to cause a denial of service (application crash) via crafted JavaScript code, as demonstrated by an error in garbage collection during allocation of a stack-overflow exception message.\n\n * CVE-2015-6580: Multiple unspecified vulnerabilities in Google V8 before 4.5.103.29, as used in Google Chrome before 45.0.2454.85, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-6581: Double free vulnerability in the opj_j2k_copy_default_tcp_and_create_tcd function in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 45.0.2454.85, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering a memory-allocation failure.\n\n * CVE-2015-6582: The decompose function in platform/transforms/TransformationMatrix.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not verify that a matrix inversion succeeded, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted web site.\n\n * CVE-2015-6583: Google Chrome before 45.0.2454.85 does not display a location bar for a hosted app's window after navigation away from the installation site, which might make it easier for remote attackers to spoof content via a crafted app, related to browser.cc and hosted_app_browser_controller.cc.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2015-08-29"
},
"Updated": {
"Date": "2015-08-29"
},
"BDUs": [
{
"ID": "BDU:2015-10875",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10875",
"Impact": "High",
"Public": "20150722"
},
{
"ID": "BDU:2015-10876",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10876",
"Impact": "High",
"Public": "20150722"
},
{
"ID": "BDU:2015-10877",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10877",
"Impact": "High",
"Public": "20150722"
},
{
"ID": "BDU:2015-10878",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2015-10878",
"Impact": "High",
"Public": "20150722"
},
{
"ID": "BDU:2015-10879",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10879",
"Impact": "High",
"Public": "20150722"
},
{
"ID": "BDU:2015-10880",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2015-10880",
"Impact": "High",
"Public": "20150722"
},
{
"ID": "BDU:2015-10881",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10881",
"Impact": "High",
"Public": "20150722"
},
{
"ID": "BDU:2015-11018",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-19",
"Href": "https://bdu.fstec.ru/vul/2015-11018",
"Impact": "Low",
"Public": "20150722"
},
{
"ID": "BDU:2015-11019",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11019",
"Impact": "Low",
"Public": "20150722"
},
{
"ID": "BDU:2015-11020",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-11020",
"Impact": "Low",
"Public": "20150722"
},
{
"ID": "BDU:2015-11021",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11021",
"Impact": "Low",
"Public": "20150722"
},
{
"ID": "BDU:2015-11027",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-11027",
"Impact": "Low",
"Public": "20150722"
},
{
"ID": "BDU:2015-11275",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2015-11275",
"Impact": "Low",
"Public": "20150904"
},
{
"ID": "BDU:2015-11276",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2015-11276",
"Impact": "Low",
"Public": "20150904"
},
{
"ID": "BDU:2015-11277",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2015-11277",
"Impact": "Low",
"Public": "20150904"
},
{
"ID": "BDU:2015-11278",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-11278",
"Impact": "High",
"Public": "20150904"
},
{
"ID": "BDU:2015-11279",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-11279",
"Impact": "High",
"Public": "20150904"
},
{
"ID": "BDU:2015-11280",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11280",
"Impact": "Low",
"Public": "20150904"
},
{
"ID": "BDU:2015-11281",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11281",
"Impact": "High",
"Public": "20150904"
},
{
"ID": "BDU:2015-11282",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11282",
"Impact": "Low",
"Public": "20150904"
},
{
"ID": "BDU:2015-11283",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-11283",
"Impact": "High",
"Public": "20150904"
},
{
"ID": "BDU:2015-11284",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11284",
"Impact": "Low",
"Public": "20150904"
},
{
"ID": "BDU:2015-11285",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-11285",
"Impact": "High",
"Public": "20150904"
},
{
"ID": "BDU:2015-11330",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-11330",
"Impact": "High",
"Public": "20150904"
},
{
"ID": "BDU:2015-11331",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-415",
"Href": "https://bdu.fstec.ru/vul/2015-11331",
"Impact": "High",
"Public": "20150904"
},
{
"ID": "BDU:2015-11332",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11332",
"Impact": "Low",
"Public": "20150904"
},
{
"ID": "BDU:2015-11333",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2015-11333",
"Impact": "Low",
"Public": "20150904"
}
],
"CVEs": [
{
"ID": "CVE-2015-1270",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-19",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1270",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1271",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1271",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1272",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1272",
"Impact": "High",
"Public": "20150723"
},
{
"ID": "CVE-2015-1273",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1273",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1274",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1274",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1276",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1276",
"Impact": "Critical",
"Public": "20150723"
},
{
"ID": "CVE-2015-1277",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1277",
"Impact": "High",
"Public": "20150723"
},
{
"ID": "CVE-2015-1278",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1278",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1279",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1279",
"Impact": "High",
"Public": "20150723"
},
{
"ID": "CVE-2015-1280",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1280",
"Impact": "High",
"Public": "20150723"
},
{
"ID": "CVE-2015-1281",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1281",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1282",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1282",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1283",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1283",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1284",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1284",
"Impact": "High",
"Public": "20150723"
},
{
"ID": "CVE-2015-1285",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1285",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1286",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1286",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1287",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1287",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1288",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1288",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-1289",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1289",
"Impact": "High",
"Public": "20150723"
},
{
"ID": "CVE-2015-1290",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1290",
"Impact": "High",
"Public": "20180109"
},
{
"ID": "CVE-2015-1291",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1291",
"Impact": "Low",
"Public": "20150903"
},
{
"ID": "CVE-2015-1292",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1292",
"Impact": "Low",
"Public": "20150903"
},
{
"ID": "CVE-2015-1293",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1293",
"Impact": "High",
"Public": "20150903"
},
{
"ID": "CVE-2015-1294",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1294",
"Impact": "High",
"Public": "20150903"
},
{
"ID": "CVE-2015-1295",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1295",
"Impact": "High",
"Public": "20150903"
},
{
"ID": "CVE-2015-1296",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1296",
"Impact": "Low",
"Public": "20150903"
},
{
"ID": "CVE-2015-1297",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1297",
"Impact": "High",
"Public": "20150903"
},
{
"ID": "CVE-2015-1298",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1298",
"Impact": "Low",
"Public": "20150903"
},
{
"ID": "CVE-2015-1299",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1299",
"Impact": "High",
"Public": "20150903"
},
{
"ID": "CVE-2015-1300",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1300",
"Impact": "Low",
"Public": "20150903"
},
{
"ID": "CVE-2015-1301",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1301",
"Impact": "High",
"Public": "20150903"
},
{
"ID": "CVE-2015-5605",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-5605",
"Impact": "Low",
"Public": "20150723"
},
{
"ID": "CVE-2015-6580",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6580",
"Impact": "High",
"Public": "20150903"
},
{
"ID": "CVE-2015-6581",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6581",
"Impact": "High",
"Public": "20150903"
},
{
"ID": "CVE-2015-6582",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6582",
"Impact": "Low",
"Public": "20150903"
},
{
"ID": "CVE-2015-6583",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6583",
"Impact": "Low",
"Public": "20150903"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20151729001",
"Comment": "chromium is earlier than 0:44.0.2403.157-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151729002",
"Comment": "chromium-gnome is earlier than 0:44.0.2403.157-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151729003",
"Comment": "chromium-kde is earlier than 0:44.0.2403.157-alt1"
}
]
}
]
}
}
]
}