Debian: DSA-2245-1: chromium-browser security update

    Date29 May 2011
    CategoryDebian
    49
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities were discovered in the Chromium browser. The Common Vulnerabilities and Exposures project identifies the following problems:
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2245-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                         Giuseppe Iuculano
    May 29, 2011                           http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : chromium-browser
    Vulnerability  : several vulnerabilities
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2011-1292 CVE-2011-1293 CVE-2011-1440 CVE-2011-1444 
                     CVE-2011-1797 CVE-2011-1799 
    
    
    Several vulnerabilities were discovered in the Chromium browser.
    The Common Vulnerabilities and Exposures project identifies the
    following problems:
    
    
    CVE-2011-1292
    
      Use-after-free vulnerability in the frame-loader implementation in Google
      Chrome allows remote attackers to cause a denial of service or possibly
      have unspecified other impact via unknown vectors.
    
    
    CVE-2011-1293
    
      Use-after-free vulnerability in the HTMLCollection implementation in Google
      Chrome allows remote attackers to cause a denial of service or possibly have
      unspecified other impact via unknown vectors.
    
    
    CVE-2011-1440
    
      Use-after-free vulnerability in Google Chrome allows remote attackers to cause
      a denial of service or possibly have unspecified other impact via vectors
      related to the ruby element and Cascading Style Sheets (CSS) token sequences.
    
    
    CVE-2011-1444
    
      Race condition in the sandbox launcher implementation in Google Chrome on
      Linux allows remote attackers to cause a denial of service or possibly have
      unspecified other impact via unknown vectors.
    
    
    CVE-2011-1797
    
      Google Chrome does not properly render tables, which allows remote attackers
      to cause a denial of service or possibly have unspecified other impact via
      unknown vectors that lead to a "stale pointer."
    
    
    CVE-2011-1799
    
      Google Chrome does not properly perform casts of variables during interaction
      with the WebKit engine, which allows remote attackers to cause a denial of
      service or possibly have unspecified other impact via unknown vectors.
    
    
    
    For the stable distribution (squeeze), these problems have been fixed in
    version 6.0.472.63~r59945-5+squeeze5.
    
    For the testing distribution (wheezy), these problems will be fixed soon.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 11.0.696.68~r84545-1.
    
    We recommend that you upgrade your chromium-browser packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":62.5,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.