CVE-2016-5224 – chromium-browser: same-origin bypass in svg
https://notcve.org/view.php?id=CVE-2016-5224
A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page. Un ataque de tiempo en aritmética de punto flotante desnormalizada en filtros SVG en Blink en Google Chrome anterior a 55.0.2883.75 para Mac, Windows y Linux y 55.0.2883.84 para Android permitió a un atacante eludir la Same Origin Policy a través de una página HTML manipulada. • http://rhn.redhat.com/errata/RHSA-2016-2919.html http://www.securityfocus.com/bid/94633 https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html https://crbug.com/615851 https://security.gentoo.org/glsa/201612-11 https://access.redhat.com/security/cve/CVE-2016-5224 https://bugzilla.redhat.com/show_bug.cgi?id=1400878 • CWE-189: Numeric Errors •
CVE-2016-5213 – chromium-browser: use after free in v8
https://notcve.org/view.php?id=CVE-2016-5213
A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un uso después de liberación de memoria en V8 en Google Chrome anterior a 55.0.2883.75 para Mac, Windows y Linux y 55.0.2883.84 para Android permitió a un atacante remoto explotar potencialmente corrupción de memoria a través de una página HTML manipulada. • http://rhn.redhat.com/errata/RHSA-2016-2919.html http://www.securityfocus.com/bid/94633 https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html https://crbug.com/652548 https://security.gentoo.org/glsa/201612-11 https://access.redhat.com/security/cve/CVE-2016-5213 https://bugzilla.redhat.com/show_bug.cgi?id=1400863 • CWE-416: Use After Free •
CVE-2016-5221 – chromium-browser: integer overflow in angle
https://notcve.org/view.php?id=CVE-2016-5221
Type confusion in libGLESv2 in ANGLE in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android possibly allowed a remote attacker to bypass buffer validation via a crafted HTML page. Confusión de tipo en libGLESv2 en ANGLE en Google Chrome anterior a 55.0.2883.75 para Mac, Windows y Linux y 55.0.2883.84 para Android posiblemente permitió a un atacante remoto eludir la validación del búfer a través de una página HTML manipulada. • http://rhn.redhat.com/errata/RHSA-2016-2919.html http://www.securityfocus.com/bid/94633 https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html https://crbug.com/660854 https://security.gentoo.org/glsa/201612-11 https://access.redhat.com/security/cve/CVE-2016-5221 https://bugzilla.redhat.com/show_bug.cgi?id=1400870 • CWE-190: Integer Overflow or Wraparound •
CVE-2016-5223 – chromium-browser: integer overflow in pdfium
https://notcve.org/view.php?id=CVE-2016-5223
Integer overflow in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption or DoS via a crafted PDF file. Vulnerabilidad de desbordamiento de entero en PDFium en Google Chrome anterior a 55.0.2883.75 para Mac, Windows y Linux y 55.0.2883.84 para Android permitió a un atacante remoto explotar potencialmente la corrupción de memoria o DoS a través de un archivo PDF manipulado. • http://rhn.redhat.com/errata/RHSA-2016-2919.html http://www.securityfocus.com/bid/94633 https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html https://crbug.com/652038 https://security.gentoo.org/glsa/201612-11 https://access.redhat.com/security/cve/CVE-2016-5223 https://bugzilla.redhat.com/show_bug.cgi?id=1400875 • CWE-190: Integer Overflow or Wraparound •
CVE-2016-5203 – chromium-browser: use after free in pdfium
https://notcve.org/view.php?id=CVE-2016-5203
A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. Un uso después de liberación de memoria en PDFium en Google Chrome anterior a 55.0.2883.75 para Mac, Windows y Linux y 55.0.2883.84 para Android permitió a un atacante remoto explotar potencialmente una corrupción de memoria a través de un archivo PDF manipulado. • http://rhn.redhat.com/errata/RHSA-2016-2919.html http://www.securityfocus.com/bid/94633 https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html https://crbug.com/644219 https://security.gentoo.org/glsa/201612-11 https://access.redhat.com/security/cve/CVE-2016-5203 https://bugzilla.redhat.com/show_bug.cgi?id=1400857 • CWE-416: Use After Free •