Debian: DSA-2930-1: chromium-browser security update

    Date17 May 2014
    CategoryDebian
    37
    Posted ByLinuxSecurity Advisories
    Several vulnerabilties have been discovered in the chromium web browser. CVE-2014-1740
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2930-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                           Michael Gilbert
    May 17, 2014                           http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : chromium-browser
    CVE ID         : CVE-2014-1740 CVE-2014-1741 CVE-2014-1742
    
    Several vulnerabilties have been discovered in the chromium web browser.
    
    CVE-2014-1740
    
        Collin Payne discovered a use-after-free issue in chromium's
        WebSockets implementation.
    
    CVE-2014-1741
    
        John Butler discovered multiple integer overflow issues in the
        Blink/Webkit document object model implementation.
    
    CVE-2014-1742
    
        cloudfuzzer discovered a use-after-free issue in the Blink/Webkit
        text editing feature.
    
    For the stable distribution (wheezy), these problems have been fixed in
    version 34.0.1847.137-1~deb7u1.
    
    For the testing distribution (jessie), these problems will be fixed soon.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 34.0.1847.137-1.
    
    We recommend that you upgrade your chromium-browser packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.