Debian: DSA-2695-1: chromium-browser security update

    Date29 May 2013
    CategoryDebian
    59
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in the chromium web browser. Multiple use-after-free, out-of-bounds read, memory safety, and cross-site scripting issues were discovered and corrected.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2695-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                           Michael Gilbert
    May 29, 2013                           http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : chromium-browser
    Vulnerability  : several issues
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2013-2837 CVE-2013-2838 CVE-2013-2839 CVE-2013-2840
                     CVE-2013-2841 CVE-2013-2842 CVE-2013-2843 CVE-2013-2844
                     CVE-2013-2845 CVE-2013-2846 CVE-2013-2847 CVE-2013-2848
                     CVE-2013-2849
    
    Several vulnerabilities have been discovered in the chromium web browser.
    Multiple use-after-free, out-of-bounds read, memory safety, and
    cross-site scripting issues were discovered and corrected.
    
    CVE-2013-2837
    
        Use-after-free vulnerability in the SVG implementation allows remote
        attackers to cause a denial of service or possibly have unspecified
        other impact via unknown vectors.
    
    CVE-2013-2838
    
        Google V8, as used in Chromium before 27.0.1453.93, allows
        remote attackers to cause a denial of service (out-of-bounds read)
        via unspecified vectors.
    
    CVE-2013-2839
    
        Chromium before 27.0.1453.93 does not properly perform a cast
        of an unspecified variable during handling of clipboard data, which
        allows remote attackers to cause a denial of service or possibly
        have other impact via unknown vectors.
    
    CVE-2013-2840
    
        Use-after-free vulnerability in the media loader in Chromium
        before 27.0.1453.93 allows remote attackers to cause a denial of
        service or possibly have unspecified other impact via unknown
        vectors, a different vulnerability than CVE-2013-2846.
    
    CVE-2013-2841
    
        Use-after-free vulnerability in Chromium before 27.0.1453.93
        allows remote attackers to cause a denial of service or possibly
        have unspecified other impact via vectors related to the handling of
        Pepper resources.
    
    CVE-2013-2842
    
        Use-after-free vulnerability in Chromium before 27.0.1453.93
        allows remote attackers to cause a denial of service or possibly
        have unspecified other impact via vectors related to the handling of
        widgets.
    
    CVE-2013-2843
    
        Use-after-free vulnerability in Chromium before 27.0.1453.93
        allows remote attackers to cause a denial of service or possibly
        have unspecified other impact via vectors related to the handling of
        speech data.
    
    CVE-2013-2844
    
        Use-after-free vulnerability in the Cascading Style Sheets (CSS)
        implementation in Chromium before 27.0.1453.93 allows remote
        attackers to cause a denial of service or possibly have unspecified
        other impact via vectors related to style resolution.
    
    CVE-2013-2845
    
        The Web Audio implementation in Google Chrome before 27.0.1453.93
        allows remote attackers to cause a denial of service (memory
        corruption) or possibly have unspecified other impact via unknown
        vectors.
    
    CVE-2013-2846
    
        Use-after-free vulnerability in the media loader in Google Chrome
        before 27.0.1453.93 allows remote attackers to cause a denial of
        service or possibly have unspecified other impact via unknown
        vectors, a different vulnerability than CVE-2013-2840.
    
    CVE-2013-2847
    
        Race condition in the workers implementation in Google Chrome before
        27.0.1453.93 allows remote attackers to cause a denial of service
        (use-after-free and application crash) or possibly have unspecified
        other impact via unknown vectors.
    
    CVE-2013-2848
    
        The XSS Auditor in Google Chrome before 27.0.1453.93 might allow
        remote attackers to obtain sensitive information via unspecified
        vectors.
    
    CVE-2013-2849
    
        Multiple cross-site scripting (XSS) vulnerabilities in Google Chrome
        before 27.0.1453.93 allow user-assisted remote attackers to inject
        arbitrary web script or HTML via vectors involving a (1)
        drag-and-drop or (2) copy-and-paste operation.
    
    
    
    For the oldstable distribution (squeeze), the security support window
    for chromium has ended.  Users of chromium on oldstable are very highly
    encouraged to upgrade to the current stable Debian release (wheezy).
    Chromium security support for wheezy will last until the next stable
    release (jessie), which is expected to happen sometime in 2015.
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 27.0.1453.93-1~deb7u1.
    
    For the testing distribution (jessie), these problems will be fixed soon.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 27.0.1453.93-1.
    
    We recommend that you upgrade your chromium-browser packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"40","type":"x","order":"1","pct":48.78,"resources":[]},{"id":"88","title":"Should be more technical","votes":"13","type":"x","order":"2","pct":15.85,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"29","type":"x","order":"3","pct":35.37,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.