lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Va98X-0005UN-5s@alpha.psidef.org>
Date: Sat, 26 Oct 2013 15:03:01 -0400
From: Michael Gilbert <mgilbert@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 2785-1] chromium-browser security
	update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2785-1                   security@...ian.org
http://www.debian.org/security/                           Michael Gilbert
October 26, 2013                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2013-2906 CVE-2013-2907 CVE-2013-2908 CVE-2013-2909 
                 CVE-2013-2910 CVE-2013-2911 CVE-2013-2912 CVE-2013-2913
                 CVE-2013-2915 CVE-2013-2916 CVE-2013-2917 CVE-2013-2918
                 CVE-2013-2919 CVE-2013-2920 CVE-2013-2921 CVE-2013-2922
                 CVE-2013-2923 CVE-2013-2924 CVE-2013-2925 CVE-2013-2926
                 CVE-2013-2927 CVE-2013-2928

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2013-2906

    Atte Kettunen of OUSPG discovered race conditions in Web Audio.

CVE-2013-2907

    Boris Zbarsky discovered an out-of-bounds read in window.prototype.

CVE-2013-2908

    Chamal de Silva discovered an address bar spoofing issue.

CVE-2013-2909

    Atte Kuttenen of OUSPG discovered a use-after-free issue in
    inline-block.

CVE-2013-2910

    Byoungyoung Lee of the Georgia Tech Information Security Center
    discovered a use-after-free issue in Web Audio.

CVE-2013-2911

    Atte Kettunen of OUSPG discovered a use-after-free in Blink's XSLT
    handling.

CVE-2013-2912

    Chamal de Silva and 41.w4r10r(at)garage4hackers.com discovered a
    use-after-free issue in the Pepper Plug-in API.

CVE-2013-2913

    cloudfuzzer discovered a use-after-free issue in Blink's XML
    document parsing.

CVE-2013-2915

    Wander Groeneveld discovered an address bar spoofing issue.

CVE-2013-2916

    Masato Kinugawa discovered an address bar spoofing issue.

CVE-2013-2917

    Byoungyoung Lee and Tielei Wang discovered an out-of-bounds read
    issue in Web Audio.

CVE-2013-2918

    Byoungyoung Lee discoverd an out-of-bounds read in Blink's DOM
    implementation.

CVE-2013-2919

    Adam Haile of Concrete Data discovered a memory corruption issue
    in the V8 javascript library.

CVE-2013-2920

    Atte Kuttunen of OUSPG discovered an out-of-bounds read in URL
    host resolving.

CVE-2013-2921

    Byoungyoung Lee and Tielei Wang discovered a use-after-free issue
    in resource loading.

CVE-2013-2922

    Jon Butler discovered a use-after-free issue in Blink's HTML
    template element implementation.

CVE-2013-2924

    A use-after-free issue was discovered in the International
    Components for Unicode (ICU) library. 

CVE-2013-2925

    Atte Kettunen of OUSPG discover a use-after-free issue in Blink's
    XML HTTP request implementation.

CVE-2013-2926

    cloudfuzzer discovered a use-after-free issue in the list indenting
    implementation.

CVE-2013-2927

    cloudfuzzer discovered a use-after-free issue in the HTML form
    submission implementation. 

CVE-2013-2923 and CVE-2013-2928

    The chrome 30 development team found various issues from internal
    fuzzing, audits, and other studies. 

For the stable distribution (wheezy), these problems have been fixed in
version 30.0.1599.101-1~deb7u1.

For the testing distribution (jessie), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 30.0.1599.101-1.

We recommend that you upgrade your chromium-browser packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=
=n1or
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ