LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 26th, 2014
Linux Security Week: September 22nd, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: 2695-1: chromium-browser: several issues Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Several vulnerabilities have been discovered in the chromium web browser. Multiple use-after-free, out-of-bounds read, memory safety, and cross-site scripting issues were discovered and corrected. [More...]
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2695-1                   security@debian.org
http://www.debian.org/security/                           Michael Gilbert
May 29, 2013                           http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
Vulnerability  : several issues
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2013-2837 CVE-2013-2838 CVE-2013-2839 CVE-2013-2840
                 CVE-2013-2841 CVE-2013-2842 CVE-2013-2843 CVE-2013-2844
                 CVE-2013-2845 CVE-2013-2846 CVE-2013-2847 CVE-2013-2848
                 CVE-2013-2849

Several vulnerabilities have been discovered in the chromium web browser.
Multiple use-after-free, out-of-bounds read, memory safety, and
cross-site scripting issues were discovered and corrected.

CVE-2013-2837

    Use-after-free vulnerability in the SVG implementation allows remote
    attackers to cause a denial of service or possibly have unspecified
    other impact via unknown vectors.

CVE-2013-2838

    Google V8, as used in Chromium before 27.0.1453.93, allows
    remote attackers to cause a denial of service (out-of-bounds read)
    via unspecified vectors.

CVE-2013-2839

    Chromium before 27.0.1453.93 does not properly perform a cast
    of an unspecified variable during handling of clipboard data, which
    allows remote attackers to cause a denial of service or possibly
    have other impact via unknown vectors.

CVE-2013-2840

    Use-after-free vulnerability in the media loader in Chromium
    before 27.0.1453.93 allows remote attackers to cause a denial of
    service or possibly have unspecified other impact via unknown
    vectors, a different vulnerability than CVE-2013-2846.

CVE-2013-2841

    Use-after-free vulnerability in Chromium before 27.0.1453.93
    allows remote attackers to cause a denial of service or possibly
    have unspecified other impact via vectors related to the handling of
    Pepper resources.

CVE-2013-2842

    Use-after-free vulnerability in Chromium before 27.0.1453.93
    allows remote attackers to cause a denial of service or possibly
    have unspecified other impact via vectors related to the handling of
    widgets.

CVE-2013-2843

    Use-after-free vulnerability in Chromium before 27.0.1453.93
    allows remote attackers to cause a denial of service or possibly
    have unspecified other impact via vectors related to the handling of
    speech data.

CVE-2013-2844

    Use-after-free vulnerability in the Cascading Style Sheets (CSS)
    implementation in Chromium before 27.0.1453.93 allows remote
    attackers to cause a denial of service or possibly have unspecified
    other impact via vectors related to style resolution.

CVE-2013-2845

    The Web Audio implementation in Google Chrome before 27.0.1453.93
    allows remote attackers to cause a denial of service (memory
    corruption) or possibly have unspecified other impact via unknown
    vectors.

CVE-2013-2846

    Use-after-free vulnerability in the media loader in Google Chrome
    before 27.0.1453.93 allows remote attackers to cause a denial of
    service or possibly have unspecified other impact via unknown
    vectors, a different vulnerability than CVE-2013-2840.

CVE-2013-2847

    Race condition in the workers implementation in Google Chrome before
    27.0.1453.93 allows remote attackers to cause a denial of service
    (use-after-free and application crash) or possibly have unspecified
    other impact via unknown vectors.

CVE-2013-2848

    The XSS Auditor in Google Chrome before 27.0.1453.93 might allow
    remote attackers to obtain sensitive information via unspecified
    vectors.

CVE-2013-2849

    Multiple cross-site scripting (XSS) vulnerabilities in Google Chrome
    before 27.0.1453.93 allow user-assisted remote attackers to inject
    arbitrary web script or HTML via vectors involving a (1)
    drag-and-drop or (2) copy-and-paste operation.



For the oldstable distribution (squeeze), the security support window
for chromium has ended.  Users of chromium on oldstable are very highly
encouraged to upgrade to the current stable Debian release (wheezy).
Chromium security support for wheezy will last until the next stable
release (jessie), which is expected to happen sometime in 2015.

For the stable distribution (wheezy), these problems have been fixed in
version 27.0.1453.93-1~deb7u1.

For the testing distribution (jessie), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 27.0.1453.93-1.

We recommend that you upgrade your chromium-browser packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.