![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2015.0123 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2015-0123) |
Zusammenfassung: | The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2015-0123 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2015-0123 advisory. Vulnerability Insight: Updated chromium-browser packages fix security vulnerabilities: The SkBitmap::ReadRawPixels function in core/SkBitmap.cpp in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation (CVE-2015-1213). Integer overflow in the SkAutoSTArray implementation in include/core/SkTemplates.h in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a reset action with a large count value, leading to an out-of-bounds write operation (CVE-2015-1214). The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation (CVE-2015-1215). Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in bindings/core/v8/custom/V8WindowCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a frame detachment (CVE-2015-1216). The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage 'type confusion' (CVE-2015-1217). Multiple use-after-free vulnerabilities in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger movement of a SCRIPT element to different documents, related to the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp and the SVGScriptElement::didMoveToNewDocument function in core/svg/SVGScriptElement.cpp (CVE-2015-1218). Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering (CVE-2015-1219). Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-decoders/gif/GIFImageReader.cpp in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted frame size in a GIF ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'chromium-browser-stable' package(s) on Mageia 4. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-1213 BugTraq ID: 72901 http://www.securityfocus.com/bid/72901 https://security.gentoo.org/glsa/201503-12 RedHat Security Advisories: RHSA-2015:0627 http://rhn.redhat.com/errata/RHSA-2015-0627.html http://www.ubuntu.com/usn/USN-2521-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-1214 Common Vulnerability Exposure (CVE) ID: CVE-2015-1215 Common Vulnerability Exposure (CVE) ID: CVE-2015-1216 Common Vulnerability Exposure (CVE) ID: CVE-2015-1217 Common Vulnerability Exposure (CVE) ID: CVE-2015-1218 Common Vulnerability Exposure (CVE) ID: CVE-2015-1219 Common Vulnerability Exposure (CVE) ID: CVE-2015-1220 Common Vulnerability Exposure (CVE) ID: CVE-2015-1221 Common Vulnerability Exposure (CVE) ID: CVE-2015-1222 Common Vulnerability Exposure (CVE) ID: CVE-2015-1223 Common Vulnerability Exposure (CVE) ID: CVE-2015-1224 Common Vulnerability Exposure (CVE) ID: CVE-2015-1225 Common Vulnerability Exposure (CVE) ID: CVE-2015-1226 Common Vulnerability Exposure (CVE) ID: CVE-2015-1227 Common Vulnerability Exposure (CVE) ID: CVE-2015-1228 Common Vulnerability Exposure (CVE) ID: CVE-2015-1229 Common Vulnerability Exposure (CVE) ID: CVE-2015-1231 Common Vulnerability Exposure (CVE) ID: CVE-2015-1232 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |