Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-1212
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:33:20.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "google-chrome-cve20151212-unspecified(100718)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=451918" }, { "name": "72497", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72497" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=451684" }, { "name": "62818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62818" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=446459" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=427303" }, { "name": "62925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62925" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=438365" }, { "name": "GLSA-201502-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=445679" }, { "name": "62917", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62917" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "name": "RHSA-2015:0163", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html" }, { "name": "62670", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/62670" }, { "name": "1031709", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031709" }, { "name": "openSUSE-SU-2015:0441", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { "name": "USN-2495-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2495-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "google-chrome-cve20151212-unspecified(100718)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=451918" }, { "name": "72497", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72497" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=451684" }, { "name": "62818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62818" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=446459" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=427303" }, { "name": "62925", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62925" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=438365" }, { "name": "GLSA-201502-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=445679" }, { "name": "62917", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62917" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "name": "RHSA-2015:0163", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html" }, { "name": "62670", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/62670" }, { "name": "1031709", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031709" }, { "name": "openSUSE-SU-2015:0441", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { "name": "USN-2495-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2495-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2015-1212", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "google-chrome-cve20151212-unspecified(100718)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=451918", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=451918" }, { "name": "72497", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72497" }, { "name": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=451684", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=451684" }, { "name": "62818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62818" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=446459", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=446459" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=427303", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=427303" }, { "name": "62925", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62925" }, { "name": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=438365", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=438365" }, { "name": "GLSA-201502-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=445679", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=445679" }, { "name": "62917", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62917" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=455225", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "name": "RHSA-2015:0163", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html" }, { "name": "62670", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62670" }, { "name": "1031709", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031709" }, { "name": "openSUSE-SU-2015:0441", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { "name": "USN-2495-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2495-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2015-1212", "datePublished": "2015-02-06T11:00:00", "dateReserved": "2015-01-21T00:00:00", "dateUpdated": "2024-08-06T04:33:20.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-1212\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2015-02-06T11:59:10.403\",\"lastModified\":\"2024-11-21T02:24:53.557\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades no especificados en Google Chrome before 40.0.2214.111 en Windows, OS X, y Linux y anterior a 40.0.2214.109 en Android permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:android:*:*\",\"versionEndExcluding\":\"40.0.2214.109\",\"matchCriteriaId\":\"DFDE8F2F-775A-4C8B-B332-B00E82A3BAB6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"40.0.2214.111\",\"matchCriteriaId\":\"855BFB6F-F192-4D7C-A07E-8311EC8C9A4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387021A0-AF36-463C-A605-32EA7DAC172E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A63F39-30BE-443F-AF10-6245587D3359\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"319EC0C6-94C5-494A-9C5D-DC5124DFC8E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]}],\"references\":[{\"url\":\"http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0163.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/62670\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/62818\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/62917\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/62925\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201502-13.xml\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.securityfocus.com/bid/72497\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.securitytracker.com/id/1031709\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2495-1\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=427303\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=438365\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=445679\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=446459\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=451684\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=451918\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=455225\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/100718\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0163.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62670\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62917\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201502-13.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/72497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1031709\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2495-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=427303\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=438365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=445679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=446459\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=451684\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=451918\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://code.google.com/p/chromium/issues/detail?id=455225\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/100718\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2015:0163
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated chromium-browser packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium. (CVE-2015-1209, CVE-2015-1210, CVE-2015-1211, CVE-2015-1212)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 40.0.2214.111, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0163", "url": "https://access.redhat.com/errata/RHSA-2015:0163" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "category": "external", "summary": "1190123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190123" }, { "category": "external", "summary": "1190124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190124" }, { "category": "external", "summary": "1190125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190125" }, { "category": "external", "summary": "1190158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190158" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0163.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-14T18:07:18+00:00", "generator": { "date": "2024-11-14T18:07:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2015:0163", "initial_release_date": "2015-02-10T21:33:52+00:00", "revision_history": [ { "date": "2015-02-10T21:33:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-02-10T21:33:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T18:07:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "product": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "product_id": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@40.0.2214.111-1.el6_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "product": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "product_id": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@40.0.2214.111-1.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "product": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "product_id": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@40.0.2214.111-1.el6_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "product": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "product_id": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@40.0.2214.111-1.el6_6?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "product": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "product_id": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@40.0.2214.111-1.el6_6?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190123" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in DOM", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of webkitgtk and webkitgtk3 as shipped with Red Hat Enterprise Linux 6 and 7 respectively.\n\nRed Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1209" }, { "category": "external", "summary": "RHBZ#1190123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190123" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1209" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in DOM" }, { "cve": "CVE-2015-1210", "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190124" } ], "notes": [ { "category": "description", "text": "The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the V8 bindings in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, does not properly consider frame access restrictions during the throwing of an exception, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: cross-origin-bypass in V8 bindings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1210" }, { "category": "external", "summary": "RHBZ#1190124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190124" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1210", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1210" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: cross-origin-bypass in V8 bindings" }, { "cve": "CVE-2015-1211", "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190125" } ], "notes": [ { "category": "description", "text": "The OriginCanAccessServiceWorkers function in content/browser/service_worker/service_worker_dispatcher_host.cc in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android does not properly restrict the URI scheme during a ServiceWorker registration, which allows remote attackers to gain privileges via a filesystem: URI.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: privilege escalation in service workers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1211" }, { "category": "external", "summary": "RHBZ#1190125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1211", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1211" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1211", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1211" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: privilege escalation in service workers" }, { "cve": "CVE-2015-1212", "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190158" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: various security fixes in Chrome 40.0.2214.111", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of webkitgtk and webkitgtk3 as shipped with Red Hat Enterprise Linux 6 and 7 respectively.\n\nRed Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1212" }, { "category": "external", "summary": "RHBZ#1190158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1212", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1212" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: various security fixes in Chrome 40.0.2214.111" } ] }
RHSA-2015:0163
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated chromium-browser packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium. (CVE-2015-1209, CVE-2015-1210, CVE-2015-1211, CVE-2015-1212)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 40.0.2214.111, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0163", "url": "https://access.redhat.com/errata/RHSA-2015:0163" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "category": "external", "summary": "1190123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190123" }, { "category": "external", "summary": "1190124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190124" }, { "category": "external", "summary": "1190125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190125" }, { "category": "external", "summary": "1190158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190158" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0163.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-14T18:07:18+00:00", "generator": { "date": "2024-11-14T18:07:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2015:0163", "initial_release_date": "2015-02-10T21:33:52+00:00", "revision_history": [ { "date": "2015-02-10T21:33:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-02-10T21:33:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T18:07:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "product": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "product_id": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@40.0.2214.111-1.el6_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "product": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "product_id": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@40.0.2214.111-1.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "product": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "product_id": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@40.0.2214.111-1.el6_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "product": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "product_id": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@40.0.2214.111-1.el6_6?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "product": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "product_id": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@40.0.2214.111-1.el6_6?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190123" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in DOM", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of webkitgtk and webkitgtk3 as shipped with Red Hat Enterprise Linux 6 and 7 respectively.\n\nRed Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1209" }, { "category": "external", "summary": "RHBZ#1190123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190123" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1209" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in DOM" }, { "cve": "CVE-2015-1210", "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190124" } ], "notes": [ { "category": "description", "text": "The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the V8 bindings in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, does not properly consider frame access restrictions during the throwing of an exception, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: cross-origin-bypass in V8 bindings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1210" }, { "category": "external", "summary": "RHBZ#1190124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190124" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1210", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1210" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: cross-origin-bypass in V8 bindings" }, { "cve": "CVE-2015-1211", "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190125" } ], "notes": [ { "category": "description", "text": "The OriginCanAccessServiceWorkers function in content/browser/service_worker/service_worker_dispatcher_host.cc in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android does not properly restrict the URI scheme during a ServiceWorker registration, which allows remote attackers to gain privileges via a filesystem: URI.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: privilege escalation in service workers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1211" }, { "category": "external", "summary": "RHBZ#1190125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1211", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1211" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1211", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1211" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: privilege escalation in service workers" }, { "cve": "CVE-2015-1212", "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190158" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: various security fixes in Chrome 40.0.2214.111", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of webkitgtk and webkitgtk3 as shipped with Red Hat Enterprise Linux 6 and 7 respectively.\n\nRed Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1212" }, { "category": "external", "summary": "RHBZ#1190158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1212", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1212" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: various security fixes in Chrome 40.0.2214.111" } ] }
rhsa-2015_0163
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated chromium-browser packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium. (CVE-2015-1209, CVE-2015-1210, CVE-2015-1211, CVE-2015-1212)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 40.0.2214.111, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0163", "url": "https://access.redhat.com/errata/RHSA-2015:0163" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "category": "external", "summary": "1190123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190123" }, { "category": "external", "summary": "1190124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190124" }, { "category": "external", "summary": "1190125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190125" }, { "category": "external", "summary": "1190158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190158" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0163.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-14T18:07:18+00:00", "generator": { "date": "2024-11-14T18:07:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2015:0163", "initial_release_date": "2015-02-10T21:33:52+00:00", "revision_history": [ { "date": "2015-02-10T21:33:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-02-10T21:33:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T18:07:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "product": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "product_id": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@40.0.2214.111-1.el6_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "product": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "product_id": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@40.0.2214.111-1.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "product": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "product_id": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@40.0.2214.111-1.el6_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "product": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "product_id": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@40.0.2214.111-1.el6_6?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "product": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "product_id": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@40.0.2214.111-1.el6_6?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.src as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.src", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.6.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1209", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190123" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: use-after-free in DOM", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of webkitgtk and webkitgtk3 as shipped with Red Hat Enterprise Linux 6 and 7 respectively.\n\nRed Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1209" }, { "category": "external", "summary": "RHBZ#1190123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190123" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1209" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: use-after-free in DOM" }, { "cve": "CVE-2015-1210", "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190124" } ], "notes": [ { "category": "description", "text": "The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the V8 bindings in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, does not properly consider frame access restrictions during the throwing of an exception, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: cross-origin-bypass in V8 bindings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1210" }, { "category": "external", "summary": "RHBZ#1190124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190124" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1210", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1210" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: cross-origin-bypass in V8 bindings" }, { "cve": "CVE-2015-1211", "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190125" } ], "notes": [ { "category": "description", "text": "The OriginCanAccessServiceWorkers function in content/browser/service_worker/service_worker_dispatcher_host.cc in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android does not properly restrict the URI scheme during a ServiceWorker registration, which allows remote attackers to gain privileges via a filesystem: URI.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: privilege escalation in service workers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1211" }, { "category": "external", "summary": "RHBZ#1190125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1211", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1211" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1211", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1211" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: privilege escalation in service workers" }, { "cve": "CVE-2015-1212", "discovery_date": "2015-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1190158" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: various security fixes in Chrome 40.0.2214.111", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of webkitgtk and webkitgtk3 as shipped with Red Hat Enterprise Linux 6 and 7 respectively.\n\nRed Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1212" }, { "category": "external", "summary": "RHBZ#1190158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1212", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1212" }, { "category": "external", "summary": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-02-10T21:33:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0163" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Client-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Client-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Server-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Server-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.src", "6Workstation-Supplementary-6.6.z:chromium-browser-0:40.0.2214.111-1.el6_6.x86_64", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.i686", "6Workstation-Supplementary-6.6.z:chromium-browser-debuginfo-0:40.0.2214.111-1.el6_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: various security fixes in Chrome 40.0.2214.111" } ] }
ghsa-j93m-fj9q-jg26
Vulnerability from github
Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
{ "affected": [], "aliases": [ "CVE-2015-1212" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-02-06T11:59:00Z", "severity": "HIGH" }, "details": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "id": "GHSA-j93m-fj9q-jg26", "modified": "2022-05-13T01:06:45Z", "published": "2022-05-13T01:06:45Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1212" }, { "type": "WEB", "url": "https://code.google.com/p/chromium/issues/detail?id=427303" }, { "type": "WEB", "url": "https://code.google.com/p/chromium/issues/detail?id=438365" }, { "type": "WEB", "url": "https://code.google.com/p/chromium/issues/detail?id=445679" }, { "type": "WEB", "url": "https://code.google.com/p/chromium/issues/detail?id=446459" }, { "type": "WEB", "url": "https://code.google.com/p/chromium/issues/detail?id=451684" }, { "type": "WEB", "url": "https://code.google.com/p/chromium/issues/detail?id=451918" }, { "type": "WEB", "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718" }, { "type": "WEB", "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html" }, { "type": "WEB", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/62670" }, { "type": "WEB", "url": "http://secunia.com/advisories/62818" }, { "type": "WEB", "url": "http://secunia.com/advisories/62917" }, { "type": "WEB", "url": "http://secunia.com/advisories/62925" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/72497" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1031709" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2495-1" } ], "schema_version": "1.4.0", "severity": [] }
var-201502-0411
Vulnerability from variot
Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors. Google Chrome is prone to multiple vulnerabilities. Attackers may exploit these issues to execute arbitrary code, bypass the same-origin policy and gain elevated privileges; other attacks are also possible. Google Chrome is a web browser developed by Google (Google). ============================================================================ Ubuntu Security Notice USN-2495-1 February 10, 2015
oxide-qt vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Oxide. (CVE-2015-1209)
It was discovered that V8 did not properly consider frame access restrictions when throwing exceptions in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to bypass same origin restrictions. (CVE-2015-1210)
It was discovered that Chromium did not properly restrict the URI scheme during ServiceWorker registration. If a user were tricked in to downloading and opening a specially crafted HTML file, an attacker could potentially exploit this to bypass security restrictions. (CVE-2015-1212)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.10: liboxideqtcore0 1.4.3-0ubuntu0.14.10.1 oxideqt-codecs 1.4.3-0ubuntu0.14.10.1 oxideqt-codecs-extra 1.4.3-0ubuntu0.14.10.1
Ubuntu 14.04 LTS: liboxideqtcore0 1.4.3-0ubuntu0.14.04.1 oxideqt-codecs 1.4.3-0ubuntu0.14.04.1 oxideqt-codecs-extra 1.4.3-0ubuntu0.14.04.1
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2015:0163-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-0163.html Issue date: 2015-02-10 CVE Names: CVE-2015-1209 CVE-2015-1210 CVE-2015-1211 CVE-2015-1212 =====================================================================
- Summary:
Updated chromium-browser packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
- Description:
Chromium is an open-source web browser, powered by WebKit (Blink).
Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. (CVE-2015-1209, CVE-2015-1210, CVE-2015-1211, CVE-2015-1212)
All Chromium users should upgrade to these updated packages, which contain Chromium version 40.0.2214.111, which corrects these issues. After installing the update, Chromium must be restarted for the changes to take effect.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1190123 - CVE-2015-1209 chromium-browser: use-after-free in DOM 1190124 - CVE-2015-1210 chromium-browser: cross-origin-bypass in V8 bindings 1190125 - CVE-2015-1211 chromium-browser: privilege escalation in service workers 1190158 - CVE-2015-1212 chromium-browser: various security fixes in Chrome 40.0.2214.111
- Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
Source: chromium-browser-40.0.2214.111-1.el6_6.src.rpm
i386: chromium-browser-40.0.2214.111-1.el6_6.i686.rpm chromium-browser-debuginfo-40.0.2214.111-1.el6_6.i686.rpm
x86_64: chromium-browser-40.0.2214.111-1.el6_6.x86_64.rpm chromium-browser-debuginfo-40.0.2214.111-1.el6_6.x86_64.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
Source: chromium-browser-40.0.2214.111-1.el6_6.src.rpm
i386: chromium-browser-40.0.2214.111-1.el6_6.i686.rpm chromium-browser-debuginfo-40.0.2214.111-1.el6_6.i686.rpm
x86_64: chromium-browser-40.0.2214.111-1.el6_6.x86_64.rpm chromium-browser-debuginfo-40.0.2214.111-1.el6_6.x86_64.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
Source: chromium-browser-40.0.2214.111-1.el6_6.src.rpm
i386: chromium-browser-40.0.2214.111-1.el6_6.i686.rpm chromium-browser-debuginfo-40.0.2214.111-1.el6_6.i686.rpm
x86_64: chromium-browser-40.0.2214.111-1.el6_6.x86_64.rpm chromium-browser-debuginfo-40.0.2214.111-1.el6_6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-1209 https://access.redhat.com/security/cve/CVE-2015-1210 https://access.redhat.com/security/cve/CVE-2015-1211 https://access.redhat.com/security/cve/CVE-2015-1212 https://access.redhat.com/security/updates/classification/#important http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFU2oc6XlSAg2UNWIIRArgRAJ0UDk0z8qCzqVFIRSEuiIgr3tP9swCfdFO2 59ank3BbCLmfdBRtQ9lpFz4= =mT/S -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/chromium < 40.0.2214.111 >= 40.0.2214.111
Description
Multiple vulnerabilities have been discovered in Chromium. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker may be able to cause a Denial of Service condition, gain privileges via a filesystem: URI, or have other unspecified impact.
Workaround
There is no known workaround at this time.
Resolution
All Chromium users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-40.0.2214.111"
References
[ 1 ] CVE-2014-7923 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923 [ 2 ] CVE-2014-7924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7924 [ 3 ] CVE-2014-7925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7925 [ 4 ] CVE-2014-7926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926 [ 5 ] CVE-2014-7927 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7927 [ 6 ] CVE-2014-7928 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7928 [ 7 ] CVE-2014-7929 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7929 [ 8 ] CVE-2014-7930 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7930 [ 9 ] CVE-2014-7931 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7931 [ 10 ] CVE-2014-7932 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7932 [ 11 ] CVE-2014-7933 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7933 [ 12 ] CVE-2014-7934 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7934 [ 13 ] CVE-2014-7935 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7935 [ 14 ] CVE-2014-7936 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7936 [ 15 ] CVE-2014-7937 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937 [ 16 ] CVE-2014-7938 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7938 [ 17 ] CVE-2014-7939 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7939 [ 18 ] CVE-2014-7940 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940 [ 19 ] CVE-2014-7941 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7941 [ 20 ] CVE-2014-7942 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7942 [ 21 ] CVE-2014-7943 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7943 [ 22 ] CVE-2014-7944 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7944 [ 23 ] CVE-2014-7945 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7945 [ 24 ] CVE-2014-7946 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7946 [ 25 ] CVE-2014-7947 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7947 [ 26 ] CVE-2014-7948 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7948 [ 27 ] CVE-2014-9646 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9646 [ 28 ] CVE-2014-9647 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9647 [ 29 ] CVE-2014-9648 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9648 [ 30 ] CVE-2015-1205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1205 [ 31 ] CVE-2015-1209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1209 [ 32 ] CVE-2015-1210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1210 [ 33 ] CVE-2015-1211 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1211 [ 34 ] CVE-2015-1212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1212 [ 35 ] CVE-2015-1346 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1346 [ 36 ] CVE-2015-1359 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1359 [ 37 ] CVE-2015-1360 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1360 [ 38 ] CVE-2015-1361 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1361
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201502-13.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0411", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "chrome", "scope": "lt", "trust": 1.0, "vendor": "google", "version": "40.0.2214.109" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.2" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.1" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.10" }, { "model": "chrome", "scope": "lt", "trust": 1.0, "vendor": "google", "version": "40.0.2214.111" }, { "model": "chrome", "scope": "lt", "trust": 0.8, "vendor": "google", "version": "40.0.2214.109 (android)" }, { "model": "chrome", "scope": "lt", "trust": 0.8, "vendor": "google", "version": "40.0.2214.111 (windows/macintosh/linux)" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "40.0.2214.89" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "40.0.2214.93" }, { "model": "hat enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "hat enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "chrome os beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.130.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.96379" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.96365" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.91275" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.47255" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.37599" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.37586" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375127" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375125" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.70" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.2491064" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.2491059" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.2491036" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1045" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1042" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.249.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.249.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.344" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.310" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.309" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.308" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.307" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.306" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.305" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.304" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.303" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.302" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.301" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.300" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.237" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.226" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.225" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.224" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.223" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.222" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.221" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.220" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.219" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.218" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.217" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.216" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.215" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.214" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.213" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.212" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.211" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.210" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.209" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.208" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.207" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.206" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.205" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.203" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.202" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.201" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.200" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.102" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.550.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.549.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.548.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.547.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.547.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.544.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.542.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.541.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.540.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.539.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.538.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.537.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.536.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.535.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.535.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.531.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.531.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.531.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.530.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.529.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.529.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.529.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.528.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.526.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.525.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.524.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.522.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.521.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.520.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.519.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.518.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.517.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.516.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.515.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.514.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.514.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.513.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.512.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.511.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.511.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.511.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.510.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.509.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.507.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.506.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.505.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.504.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.503.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.503.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.500.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.500.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.499.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.499.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.498.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0.497.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.496.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.495.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.495.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.494.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.493.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.492.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.491.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.490.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.490.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.489.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.488.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.487.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.486.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.485.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.484.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.483.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.482.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.481.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.480.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.479.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.478.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.477.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.476.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.475.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.474.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.473.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.24" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.472.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.471.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.470.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.469.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.467.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.466.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.465.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.465.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.464.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.462.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.461.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.460.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.459.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.458.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.457.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.456.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.455.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.454.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.453.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.453.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.452.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.452.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.451.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.450.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.449.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.447.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.446.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.445.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.445.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.444.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.443.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.441.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.440.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.438.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.437.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.436.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.435.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.434.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.433.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.432.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.431.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.430.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.428.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.427.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.426.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.425.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.424.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.423.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.422.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.421.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.419.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.418.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.417.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.416.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.416.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.415.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.415.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.414.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.413.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.412.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.411.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.410.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.409.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.408.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.407.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.406.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.405.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.404.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.403.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.401.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.401.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.400.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.399.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.398.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.397.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.396.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.395.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.394.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.393.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.392.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.391.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.390.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.387.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.386.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.385.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.384.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.383.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.382.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.382.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.381.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.380.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.379.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.378.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.376.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.98" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.97" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.96" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.95" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.93" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.92" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.91" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.90" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.89" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.88" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.87" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.85" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.82" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.81" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.80" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.79" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.76" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.74" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.73" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.72" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.69" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.67" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.66" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.62" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.61" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.58" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.54" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.51" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.50" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.49" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.47" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.45" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.44" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.41" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.40" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.35" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.34" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.33" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.32" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.31" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.30" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.29" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.26" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.23" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.22" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.21" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.18" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.17" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.15" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.126" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.375.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.374.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.373.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.372.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.371.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.370.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.369.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.368.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.367.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.366.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.365.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.364.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.363.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.362.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.361.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.360.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.359.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.358.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.357.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.356.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.355.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.354.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.354.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.353.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.351.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.350.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.350.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.349.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.348.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.347.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.346.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.345.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.344.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.343.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.342.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.341.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.340.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.339.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.338.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.337.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.336.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.335.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.334.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.333.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.332.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.330.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.329.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.328.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.327.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.326.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.325.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.324.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.323.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.322.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.321.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.320.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.319.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.318.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.317.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.316.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.315.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.314.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.314.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.313.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.309.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.308.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.9" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.307.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.306.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.306.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1063" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1062" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1061" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1060" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1058" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1057" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1056" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1055" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1054" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1053" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1052" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1051" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1050" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1049" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1048" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1047" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1046" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1044" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1043" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1041" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1040" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1039" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1038" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1037" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1035" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1034" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1033" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1032" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1031" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1030" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1029" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1028" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1027" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1026" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1025" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1024" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1023" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1022" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1021" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1020" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1019" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1018" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1017" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1016" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1015" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1014" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1013" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1012" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1011" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1010" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1009" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1008" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1007" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1006" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1004" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.1001" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1.249.0" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.305.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.304.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.303.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.302.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.301.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.300.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.299.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.296.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.295.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.294.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.292.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.290.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.289.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.288.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.288.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.287.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.286.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.278.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.277.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.276.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.275.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.275.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.272.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.271.0" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.249.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.224.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.7" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.223.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.222.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.221.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.212.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.212.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.0.211.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.37" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.36" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.25" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.195.2" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.193.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.190.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0.182.2" }, { "model": "chrome beta", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.38" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.28" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.27" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.172" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.170.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.169.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.169.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.159.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.158.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.157.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.157.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "2.0.156.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19.0.1084.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.168" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.162" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.151" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "18.0.1025.142" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.83" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.78" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.60" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.56" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "17.0.963.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.75" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16.0.912.63" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "16" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.121" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "15.0.874.120" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.202" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.186" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14.0.835.163" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.215" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.91" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.100" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.71" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.672.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.205" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.133" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.128" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.127" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.65" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.64" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.59" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.55" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.53" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.52" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.48" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.46" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.43" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.42" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.39" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "1.0.154.36" } ], "sources": [ { "db": "BID", "id": "72497" }, { "db": "JVNDB", "id": "JVNDB-2015-001336" }, { "db": "CNNVD", "id": "CNNVD-201502-121" }, { "db": "NVD", "id": "CVE-2015-1212" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:google:chrome", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001336" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Maksymillian Motyl, anonymous and Google", "sources": [ { "db": "BID", "id": "72497" } ], "trust": 0.3 }, "cve": "CVE-2015-1212", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2015-1212", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-79173", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-1212", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-1212", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201502-121", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-79173", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-1212", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-79173" }, { "db": "VULMON", "id": "CVE-2015-1212" }, { "db": "JVNDB", "id": "JVNDB-2015-001336" }, { "db": "CNNVD", "id": "CNNVD-201502-121" }, { "db": "NVD", "id": "CVE-2015-1212" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors. Google Chrome is prone to multiple vulnerabilities. \nAttackers may exploit these issues to execute arbitrary code, bypass the same-origin policy and gain elevated privileges; other attacks are also possible. Google Chrome is a web browser developed by Google (Google). ============================================================================\nUbuntu Security Notice USN-2495-1\nFebruary 10, 2015\n\noxide-qt vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.10\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Oxide. (CVE-2015-1209)\n\nIt was discovered that V8 did not properly consider frame access\nrestrictions when throwing exceptions in some circumstances. If a user\nwere tricked in to opening a specially crafted website, an attacker could\npotentially exploit this to bypass same origin restrictions. \n(CVE-2015-1210)\n\nIt was discovered that Chromium did not properly restrict the URI scheme\nduring ServiceWorker registration. If a user were tricked in to\ndownloading and opening a specially crafted HTML file, an attacker could\npotentially exploit this to bypass security restrictions. (CVE-2015-1212)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.10:\n liboxideqtcore0 1.4.3-0ubuntu0.14.10.1\n oxideqt-codecs 1.4.3-0ubuntu0.14.10.1\n oxideqt-codecs-extra 1.4.3-0ubuntu0.14.10.1\n\nUbuntu 14.04 LTS:\n liboxideqtcore0 1.4.3-0ubuntu0.14.04.1\n oxideqt-codecs 1.4.3-0ubuntu0.14.04.1\n oxideqt-codecs-extra 1.4.3-0ubuntu0.14.04.1\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: chromium-browser security update\nAdvisory ID: RHSA-2015:0163-01\nProduct: Red Hat Enterprise Linux Supplementary\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-0163.html\nIssue date: 2015-02-10\nCVE Names: CVE-2015-1209 CVE-2015-1210 CVE-2015-1211 \n CVE-2015-1212 \n=====================================================================\n\n1. Summary:\n\nUpdated chromium-browser packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 6 Supplementary. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64\n\n3. Description:\n\nChromium is an open-source web browser, powered by WebKit (Blink). \n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium. (CVE-2015-1209, CVE-2015-1210, CVE-2015-1211, CVE-2015-1212)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 40.0.2214.111, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take\neffect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1190123 - CVE-2015-1209 chromium-browser: use-after-free in DOM\n1190124 - CVE-2015-1210 chromium-browser: cross-origin-bypass in V8 bindings\n1190125 - CVE-2015-1211 chromium-browser: privilege escalation in service workers\n1190158 - CVE-2015-1212 chromium-browser: various security fixes in Chrome 40.0.2214.111\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 6):\n\nSource:\nchromium-browser-40.0.2214.111-1.el6_6.src.rpm\n\ni386:\nchromium-browser-40.0.2214.111-1.el6_6.i686.rpm\nchromium-browser-debuginfo-40.0.2214.111-1.el6_6.i686.rpm\n\nx86_64:\nchromium-browser-40.0.2214.111-1.el6_6.x86_64.rpm\nchromium-browser-debuginfo-40.0.2214.111-1.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Supplementary (v. 6):\n\nSource:\nchromium-browser-40.0.2214.111-1.el6_6.src.rpm\n\ni386:\nchromium-browser-40.0.2214.111-1.el6_6.i686.rpm\nchromium-browser-debuginfo-40.0.2214.111-1.el6_6.i686.rpm\n\nx86_64:\nchromium-browser-40.0.2214.111-1.el6_6.x86_64.rpm\nchromium-browser-debuginfo-40.0.2214.111-1.el6_6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Supplementary (v. 6):\n\nSource:\nchromium-browser-40.0.2214.111-1.el6_6.src.rpm\n\ni386:\nchromium-browser-40.0.2214.111-1.el6_6.i686.rpm\nchromium-browser-debuginfo-40.0.2214.111-1.el6_6.i686.rpm\n\nx86_64:\nchromium-browser-40.0.2214.111-1.el6_6.x86_64.rpm\nchromium-browser-debuginfo-40.0.2214.111-1.el6_6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-1209\nhttps://access.redhat.com/security/cve/CVE-2015-1210\nhttps://access.redhat.com/security/cve/CVE-2015-1211\nhttps://access.redhat.com/security/cve/CVE-2015-1212\nhttps://access.redhat.com/security/updates/classification/#important\nhttp://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFU2oc6XlSAg2UNWIIRArgRAJ0UDk0z8qCzqVFIRSEuiIgr3tP9swCfdFO2\n59ank3BbCLmfdBRtQ9lpFz4=\n=mT/S\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-client/chromium \u003c 40.0.2214.111 \u003e= 40.0.2214.111\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Chromium. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker may be able to cause a Denial of Service condition,\ngain privileges via a filesystem: URI, or have other unspecified\nimpact. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Chromium users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=www-client/chromium-40.0.2214.111\"\n\nReferences\n==========\n\n[ 1 ] CVE-2014-7923\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7923\n[ 2 ] CVE-2014-7924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7924\n[ 3 ] CVE-2014-7925\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7925\n[ 4 ] CVE-2014-7926\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7926\n[ 5 ] CVE-2014-7927\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7927\n[ 6 ] CVE-2014-7928\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7928\n[ 7 ] CVE-2014-7929\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7929\n[ 8 ] CVE-2014-7930\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7930\n[ 9 ] CVE-2014-7931\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7931\n[ 10 ] CVE-2014-7932\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7932\n[ 11 ] CVE-2014-7933\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7933\n[ 12 ] CVE-2014-7934\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7934\n[ 13 ] CVE-2014-7935\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7935\n[ 14 ] CVE-2014-7936\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7936\n[ 15 ] CVE-2014-7937\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7937\n[ 16 ] CVE-2014-7938\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7938\n[ 17 ] CVE-2014-7939\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7939\n[ 18 ] CVE-2014-7940\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7940\n[ 19 ] CVE-2014-7941\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7941\n[ 20 ] CVE-2014-7942\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7942\n[ 21 ] CVE-2014-7943\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7943\n[ 22 ] CVE-2014-7944\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7944\n[ 23 ] CVE-2014-7945\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7945\n[ 24 ] CVE-2014-7946\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7946\n[ 25 ] CVE-2014-7947\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7947\n[ 26 ] CVE-2014-7948\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7948\n[ 27 ] CVE-2014-9646\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9646\n[ 28 ] CVE-2014-9647\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9647\n[ 29 ] CVE-2014-9648\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9648\n[ 30 ] CVE-2015-1205\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1205\n[ 31 ] CVE-2015-1209\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1209\n[ 32 ] CVE-2015-1210\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1210\n[ 33 ] CVE-2015-1211\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1211\n[ 34 ] CVE-2015-1212\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1212\n[ 35 ] CVE-2015-1346\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1346\n[ 36 ] CVE-2015-1359\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1359\n[ 37 ] CVE-2015-1360\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1360\n[ 38 ] CVE-2015-1361\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1361\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201502-13.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2015 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2015-1212" }, { "db": "JVNDB", "id": "JVNDB-2015-001336" }, { "db": "BID", "id": "72497" }, { "db": "VULHUB", "id": "VHN-79173" }, { "db": "VULMON", "id": "CVE-2015-1212" }, { "db": "PACKETSTORM", "id": "130345" }, { "db": "PACKETSTORM", "id": "130348" }, { "db": "PACKETSTORM", "id": "130428" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-1212", "trust": 3.2 }, { "db": "BID", "id": "72497", "trust": 2.1 }, { "db": "SECTRACK", "id": "1031709", "trust": 1.8 }, { "db": "SECUNIA", "id": "62818", "trust": 1.8 }, { "db": "SECUNIA", "id": "62925", "trust": 1.8 }, { "db": "SECUNIA", "id": "62670", "trust": 1.8 }, { "db": "SECUNIA", "id": "62917", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2015-001336", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201502-121", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-79173", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-1212", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130345", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130348", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130428", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-79173" }, { "db": "VULMON", "id": "CVE-2015-1212" }, { "db": "BID", "id": "72497" }, { "db": "JVNDB", "id": "JVNDB-2015-001336" }, { "db": "PACKETSTORM", "id": "130345" }, { "db": "PACKETSTORM", "id": "130348" }, { "db": "PACKETSTORM", "id": "130428" }, { "db": "CNNVD", "id": "CNNVD-201502-121" }, { "db": "NVD", "id": "CVE-2015-1212" } ] }, "id": "VAR-201502-0411", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-79173" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:29:02.798000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Google Chrome", "trust": 0.8, "url": "https://www.google.com/intl/ja/chrome/browser/features.html" }, { "title": "Chrome for Android Update", "trust": 0.8, "url": "http://googlechromereleases.blogspot.jp/2015/02/chrome-for-android-update.html" }, { "title": "Stable Channel Update", "trust": 0.8, "url": "http://googlechromereleases.blogspot.jp/2015/02/stable-channel-update.html" }, { "title": "Issue 455225", "trust": 0.8, "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "title": "RHSA-2015:0163", "trust": 0.8, "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html" }, { "title": "Chrome Browser -40.0.2214.109", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=53640" }, { "title": "Chrome 40.0.2214.111%5B Official original with update function -32 Bit version %5D", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=53639" }, { "title": "Red Hat: Important: chromium-browser security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20150163 - Security Advisory" }, { "title": "Red Hat: CVE-2015-1212", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2015-1212" }, { "title": "Ubuntu Security Notice: oxide-qt vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2495-1" }, { "title": "CVE-Study", "trust": 0.1, "url": "https://github.com/thdusdl1219/CVE-Study " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/google-fixes-51-bugs-in-chrome-41/111428/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-1212" }, { "db": "JVNDB", "id": "JVNDB-2015-001336" }, { "db": "CNNVD", "id": "CNNVD-201502-121" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2015-1212" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "trust": 1.9, "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2015-0163.html" }, { "trust": 1.9, "url": "http://www.ubuntu.com/usn/usn-2495-1" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/72497" }, { "trust": 1.8, "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html" }, { "trust": 1.8, "url": "https://code.google.com/p/chromium/issues/detail?id=427303" }, { "trust": 1.8, "url": "https://code.google.com/p/chromium/issues/detail?id=438365" }, { "trust": 1.8, "url": "https://code.google.com/p/chromium/issues/detail?id=445679" }, { "trust": 1.8, "url": "https://code.google.com/p/chromium/issues/detail?id=446459" }, { "trust": 1.8, "url": "https://code.google.com/p/chromium/issues/detail?id=451684" }, { "trust": 1.8, "url": "https://code.google.com/p/chromium/issues/detail?id=451918" }, { "trust": 1.8, "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1031709" }, { "trust": 1.8, "url": "http://secunia.com/advisories/62670" }, { "trust": 1.8, "url": "http://secunia.com/advisories/62818" }, { "trust": 1.8, "url": "http://secunia.com/advisories/62917" }, { "trust": 1.8, "url": "http://secunia.com/advisories/62925" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { "trust": 1.8, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1212" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1212" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-1212" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1211" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1210" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1209" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1212" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2015:0163" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2495-1/" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=37370" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/oxide-qt/1.4.3-0ubuntu0.14.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/oxide-qt/1.4.3-0ubuntu0.14.04.1" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-1211" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-1210" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-1209" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7942" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7931" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1359" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7940" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7927" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9646" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7929" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7923" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7928" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7935" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7937" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9648" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1360" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1210" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7940" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7930" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7945" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1212" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7937" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7941" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1361" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7925" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7947" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7941" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7942" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9647" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1346" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7924" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1205" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1209" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7934" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7933" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7925" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7947" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7927" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9646" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7928" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7933" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7946" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9647" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7926" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7938" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7929" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7936" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7936" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7943" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1211" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7931" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7926" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7945" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7948" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7932" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7939" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7946" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7944" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7935" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7934" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7944" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7923" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7939" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7948" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7924" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7932" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7938" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7930" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7943" } ], "sources": [ { "db": "VULHUB", "id": "VHN-79173" }, { "db": "VULMON", "id": "CVE-2015-1212" }, { "db": "JVNDB", "id": "JVNDB-2015-001336" }, { "db": "PACKETSTORM", "id": "130345" }, { "db": "PACKETSTORM", "id": "130348" }, { "db": "PACKETSTORM", "id": "130428" }, { "db": "CNNVD", "id": "CNNVD-201502-121" }, { "db": "NVD", "id": "CVE-2015-1212" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-79173" }, { "db": "VULMON", "id": "CVE-2015-1212" }, { "db": "BID", "id": "72497" }, { "db": "JVNDB", "id": "JVNDB-2015-001336" }, { "db": "PACKETSTORM", "id": "130345" }, { "db": "PACKETSTORM", "id": "130348" }, { "db": "PACKETSTORM", "id": "130428" }, { "db": "CNNVD", "id": "CNNVD-201502-121" }, { "db": "NVD", "id": "CVE-2015-1212" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-02-06T00:00:00", "db": "VULHUB", "id": "VHN-79173" }, { "date": "2015-02-06T00:00:00", "db": "VULMON", "id": "CVE-2015-1212" }, { "date": "2015-02-04T00:00:00", "db": "BID", "id": "72497" }, { "date": "2015-02-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001336" }, { "date": "2015-02-11T01:50:04", "db": "PACKETSTORM", "id": "130345" }, { "date": "2015-02-11T01:52:02", "db": "PACKETSTORM", "id": "130348" }, { "date": "2015-02-17T22:22:00", "db": "PACKETSTORM", "id": "130428" }, { "date": "2015-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-121" }, { "date": "2015-02-06T11:59:10.403000", "db": "NVD", "id": "CVE-2015-1212" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-28T00:00:00", "db": "VULHUB", "id": "VHN-79173" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2015-1212" }, { "date": "2015-03-19T08:01:00", "db": "BID", "id": "72497" }, { "date": "2015-02-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-001336" }, { "date": "2020-09-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201502-121" }, { "date": "2024-11-21T02:24:53.557000", "db": "NVD", "id": "CVE-2015-1212" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "130428" }, { "db": "CNNVD", "id": "CNNVD-201502-121" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Google Chrome Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-001336" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201502-121" } ], "trust": 0.6 } }
fkie_cve-2015-1212
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
chrome | * | ||
chrome | * | ||
apple | macos | - | |
linux | linux_kernel | - | |
microsoft | windows | - | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 14.10 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_eus | 6.6 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server_aus | 6.6 | |
redhat | enterprise_linux_workstation | 6.0 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:android:*:*", "matchCriteriaId": "DFDE8F2F-775A-4C8B-B332-B00E82A3BAB6", "versionEndExcluding": "40.0.2214.109", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "855BFB6F-F192-4D7C-A07E-8311EC8C9A4D", "versionEndExcluding": "40.0.2214.111", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "319EC0C6-94C5-494A-9C5D-DC5124DFC8E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificados en Google Chrome before 40.0.2214.111 en Windows, OS X, y Linux y anterior a 40.0.2214.109 en Android permiten a atacantes causar una denegaci\u00f3n de servicio o posiblemente tener otro impacto a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2015-1212", "lastModified": "2024-11-21T02:24:53.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-06T11:59:10.403", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/62670" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/62818" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/62917" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/62925" }, { "source": "chrome-cve-admin@google.com", "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securityfocus.com/bid/72497" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id/1031709" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.ubuntu.com/usn/USN-2495-1" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=427303" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=438365" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=445679" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=446459" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=451684" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=451918" }, { "source": "chrome-cve-admin@google.com", "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "source": "chrome-cve-admin@google.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62670" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/62925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1031709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2495-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=427303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=438365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=445679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=446459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=451684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=451918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2015-1212
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-1212", "description": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "id": "GSD-2015-1212", "references": [ "https://www.suse.com/security/cve/CVE-2015-1212.html", "https://access.redhat.com/errata/RHSA-2015:0163", "https://ubuntu.com/security/CVE-2015-1212", "https://advisories.mageia.org/CVE-2015-1212.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-1212" ], "details": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "id": "GSD-2015-1212", "modified": "2023-12-13T01:20:05.476411Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2015-1212", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "google-chrome-cve20151212-unspecified(100718)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=451918", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=451918" }, { "name": "72497", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72497" }, { "name": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=451684", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=451684" }, { "name": "62818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62818" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=446459", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=446459" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=427303", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=427303" }, { "name": "62925", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62925" }, { "name": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=438365", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=438365" }, { "name": "GLSA-201502-13", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=445679", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=445679" }, { "name": "62917", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62917" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=455225", "refsource": "CONFIRM", "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "name": "RHSA-2015:0163", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html" }, { "name": "62670", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/62670" }, { "name": "1031709", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031709" }, { "name": "openSUSE-SU-2015:0441", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { "name": "USN-2495-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2495-1" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:android:*:*", "cpe_name": [], "versionEndExcluding": "40.0.2214.109", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "40.0.2214.111", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2015-1212" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://code.google.com/p/chromium/issues/detail?id=446459", "refsource": "CONFIRM", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=446459" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=445679", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=445679" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=427303", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=427303" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=451684", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=451684" }, { "name": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=455225", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=455225" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=451918", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=451918" }, { "name": "https://code.google.com/p/chromium/issues/detail?id=438365", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://code.google.com/p/chromium/issues/detail?id=438365" }, { "name": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html" }, { "name": "RHSA-2015:0163", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0163.html" }, { "name": "USN-2495-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2495-1" }, { "name": "62670", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/62670" }, { "name": "62818", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/62818" }, { "name": "1031709", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031709" }, { "name": "72497", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/72497" }, { "name": "62917", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/62917" }, { "name": "62925", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/62925" }, { "name": "GLSA-201502-13", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201502-13.xml" }, { "name": "openSUSE-SU-2015:0441", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html" }, { "name": "google-chrome-cve20151212-unspecified(100718)", "refsource": "XF", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100718" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2021-09-08T17:19Z", "publishedDate": "2015-02-06T11:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.