Linux Security
Linux Security
Linux Security

Debian: DSA-2785-1: chromium-browser security update

Date 26 Oct 2013
159
Posted By LinuxSecurity Advisories
Several vulnerabilities have been discovered in the chromium web browser. CVE-2013-2906

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2785-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/                           Michael Gilbert
October 26, 2013                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2013-2906 CVE-2013-2907 CVE-2013-2908 CVE-2013-2909 
                 CVE-2013-2910 CVE-2013-2911 CVE-2013-2912 CVE-2013-2913
                 CVE-2013-2915 CVE-2013-2916 CVE-2013-2917 CVE-2013-2918
                 CVE-2013-2919 CVE-2013-2920 CVE-2013-2921 CVE-2013-2922
                 CVE-2013-2923 CVE-2013-2924 CVE-2013-2925 CVE-2013-2926
                 CVE-2013-2927 CVE-2013-2928

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2013-2906

    Atte Kettunen of OUSPG discovered race conditions in Web Audio.

CVE-2013-2907

    Boris Zbarsky discovered an out-of-bounds read in window.prototype.

CVE-2013-2908

    Chamal de Silva discovered an address bar spoofing issue.

CVE-2013-2909

    Atte Kuttenen of OUSPG discovered a use-after-free issue in
    inline-block.

CVE-2013-2910

    Byoungyoung Lee of the Georgia Tech Information Security Center
    discovered a use-after-free issue in Web Audio.

CVE-2013-2911

    Atte Kettunen of OUSPG discovered a use-after-free in Blink's XSLT
    handling.

CVE-2013-2912

    Chamal de Silva and 41.w4r10r(at)garage4hackers.com discovered a
    use-after-free issue in the Pepper Plug-in API.

CVE-2013-2913

    cloudfuzzer discovered a use-after-free issue in Blink's XML
    document parsing.

CVE-2013-2915

    Wander Groeneveld discovered an address bar spoofing issue.

CVE-2013-2916

    Masato Kinugawa discovered an address bar spoofing issue.

CVE-2013-2917

    Byoungyoung Lee and Tielei Wang discovered an out-of-bounds read
    issue in Web Audio.

CVE-2013-2918

    Byoungyoung Lee discoverd an out-of-bounds read in Blink's DOM
    implementation.

CVE-2013-2919

    Adam Haile of Concrete Data discovered a memory corruption issue
    in the V8 javascript library.

CVE-2013-2920

    Atte Kuttunen of OUSPG discovered an out-of-bounds read in URL
    host resolving.

CVE-2013-2921

    Byoungyoung Lee and Tielei Wang discovered a use-after-free issue
    in resource loading.

CVE-2013-2922

    Jon Butler discovered a use-after-free issue in Blink's HTML
    template element implementation.

CVE-2013-2924

    A use-after-free issue was discovered in the International
    Components for Unicode (ICU) library. 

CVE-2013-2925

    Atte Kettunen of OUSPG discover a use-after-free issue in Blink's
    XML HTTP request implementation.

CVE-2013-2926

    cloudfuzzer discovered a use-after-free issue in the list indenting
    implementation.

CVE-2013-2927

    cloudfuzzer discovered a use-after-free issue in the HTML form
    submission implementation. 

CVE-2013-2923 and CVE-2013-2928

    The chrome 30 development team found various issues from internal
    fuzzing, audits, and other studies. 

For the stable distribution (wheezy), these problems have been fixed in
version 30.0.1599.101-1~deb7u1.

For the testing distribution (jessie), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 30.0.1599.101-1.

We recommend that you upgrade your chromium-browser packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

Advisories

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.