Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:yukoff:openSUSE:Leap:42.1:Backports
patchinfo.5151
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.5151
<patchinfo incident="5151"> <packager>AndreasStieger</packager> <issue tracker="cve" id="2016-1672"></issue> <issue tracker="cve" id="2016-1673"></issue> <issue tracker="cve" id="2016-1674"></issue> <issue tracker="cve" id="2016-1675"></issue> <issue tracker="cve" id="2016-1676"></issue> <issue tracker="cve" id="2016-1677"></issue> <issue tracker="cve" id="2016-1678"></issue> <issue tracker="cve" id="2016-1679"></issue> <issue tracker="cve" id="2016-1680"></issue> <issue tracker="cve" id="2016-1681"></issue> <issue tracker="cve" id="2016-1682"></issue> <issue tracker="cve" id="2016-1683"></issue> <issue tracker="cve" id="2016-1684"></issue> <issue tracker="cve" id="2016-1685"></issue> <issue tracker="cve" id="2016-1686"></issue> <issue tracker="cve" id="2016-1687"></issue> <issue tracker="cve" id="2016-1688"></issue> <issue tracker="cve" id="2016-1689"></issue> <issue tracker="cve" id="2016-1690"></issue> <issue tracker="cve" id="2016-1691"></issue> <issue tracker="cve" id="2016-1692"></issue> <issue tracker="cve" id="2016-1693"></issue> <issue tracker="cve" id="2016-1694"></issue> <issue tracker="cve" id="2016-1695"></issue> <issue tracker="bnc" id="981886">VUL-0: chromium: multiple vulnerabilities fixed in 51.0.2704.63</issue> <category>security</category> <rating>important</rating> <summary>Security update for Chromium</summary> <description>Chromium was updated to 51.0.2704.63 to fix the following vulnerabilities (boo#981886): - CVE-2016-1672: Cross-origin bypass in extension bindings - CVE-2016-1673: Cross-origin bypass in Blink - CVE-2016-1674: Cross-origin bypass in extensions - CVE-2016-1675: Cross-origin bypass in Blink - CVE-2016-1676: Cross-origin bypass in extension bindings - CVE-2016-1677: Type confusion in V8 - CVE-2016-1678: Heap overflow in V8 - CVE-2016-1679: Heap use-after-free in V8 bindings - CVE-2016-1680: Heap use-after-free in Skia - CVE-2016-1681: Heap overflow in PDFium - CVE-2016-1682: CSP bypass for ServiceWorker - CVE-2016-1683: Out-of-bounds access in libxslt - CVE-2016-1684: Integer overflow in libxslt - CVE-2016-1685: Out-of-bounds read in PDFium - CVE-2016-1686: Out-of-bounds read in PDFium - CVE-2016-1687: Information leak in extensions - CVE-2016-1688: Out-of-bounds read in V8 - CVE-2016-1689: Heap buffer overflow in media - CVE-2016-1690: Heap use-after-free in Autofill - CVE-2016-1691: Heap buffer-overflow in Skia - CVE-2016-1692: Limited cross-origin bypass in ServiceWorker - CVE-2016-1693: HTTP Download of Software Removal Tool - CVE-2016-1694: HPKP pins removed on cache clearance - CVE-2016-1695: Various fixes from internal audits, fuzzing and other initiatives </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor