Debian: DSA-2706-1: chromium-browser security update

    Date10 Jun 2013
    CategoryDebian
    22
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in the chromium web browser. CVE-2013-2855
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2706-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                         Giuseppe Iuculano
    June 10, 2013                          http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : chromium-browser
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2013-2855 CVE-2013-2856 CVE-2013-2857 CVE-2013-2858 
                     CVE-2013-2859 CVE-2013-2860 CVE-2013-2861 CVE-2013-2862
    		 CVE-2013-2863 CVE-2013-2865
    
    Several vulnerabilities have been discovered in the chromium web
    browser. 
    
    CVE-2013-2855
    
        The Developer Tools API in Chromium before 27.0.1453.110 allows
        remote attackers to cause a denial of service (memory corruption) or
        possibly have unspecified other impact via unknown vectors.
    
    CVE-2013-2856
    
        Use-after-free vulnerability in Chromium before 27.0.1453.110
        allows remote attackers to cause a denial of service or possibly
        have unspecified other impact via vectors related to the handling of
        input.
    
    CVE-2013-2857
    
        Use-after-free vulnerability in Chromium before 27.0.1453.110
        allows remote attackers to cause a denial of service or possibly
        have unspecified other impact via vectors related to the handling of
        images.
    
    CVE-2013-2858
    
        Use-after-free vulnerability in the HTML5 Audio implementation in
        Chromium before 27.0.1453.110 allows remote attackers to cause
        a denial of service or possibly have unspecified other impact via
        unknown vectors.
    
    CVE-2013-2859
    
        Chromium before 27.0.1453.110 allows remote attackers to bypass
        the Same Origin Policy and trigger namespace pollution via
        unspecified vectors.
    
    CVE-2013-2860
    
        Use-after-free vulnerability in Chromium before 27.0.1453.110
        allows remote attackers to cause a denial of service or possibly
        have unspecified other impact via vectors involving access to a
        database API by a worker process.
    
    CVE-2013-2861
    
        Use-after-free vulnerability in the SVG implementation in Chromium
        before 27.0.1453.110 allows remote attackers to cause a
        denial of service or possibly have unspecified other impact via
        unknown vectors.
    
    CVE-2013-2862
    
        Skia, as used in Chromium before 27.0.1453.110, does not
        properly handle GPU acceleration, which allows remote attackers to
        cause a denial of service (memory corruption) or possibly have
        unspecified other impact via unknown vectors.
    
    CVE-2013-2863
    
        Chromium before 27.0.1453.110 does not properly handle SSL
        sockets, which allows remote attackers to execute arbitrary code or
        cause a denial of service (memory corruption) via unspecified
        vectors.
    
    CVE-2013-2865
    
        Multiple unspecified vulnerabilities in Chromium before
        27.0.1453.110 allow attackers to cause a denial of service or
        possibly have other impact via unknown vectors.
    
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 27.0.1453.110-1~deb7u1.
    
    For the testing distribution (jessie), these problems have been fixed in
    version 27.0.1453.110-1.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 27.0.1453.110-1.
    
    We recommend that you upgrade your chromium-browser packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"4","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":14.29,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.