drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in chromium-browser
Name: |
Mehrere Probleme in chromium-browser |
|
ID: |
DSA-2785-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
Sa, 26. Oktober 2013, 21:27 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2906
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2907
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2908
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2909
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2910
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2911
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2912
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2913
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2915
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2916
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2917
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2918
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2919
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2920
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2921
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2922
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2923
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2924
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2925
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2928 |
|
Applikationen: |
Chromium |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2785-1 security@debian.org http://www.debian.org/security/ Michael Gilbert October 26, 2013 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : chromium-browser Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2013-2906 CVE-2013-2907 CVE-2013-2908 CVE-2013-2909 CVE-2013-2910 CVE-2013-2911 CVE-2013-2912 CVE-2013-2913 CVE-2013-2915 CVE-2013-2916 CVE-2013-2917 CVE-2013-2918 CVE-2013-2919 CVE-2013-2920 CVE-2013-2921 CVE-2013-2922 CVE-2013-2923 CVE-2013-2924 CVE-2013-2925 CVE-2013-2926 CVE-2013-2927 CVE-2013-2928
Several vulnerabilities have been discovered in the chromium web browser.
CVE-2013-2906
Atte Kettunen of OUSPG discovered race conditions in Web Audio.
CVE-2013-2907
Boris Zbarsky discovered an out-of-bounds read in window.prototype.
CVE-2013-2908
Chamal de Silva discovered an address bar spoofing issue.
CVE-2013-2909
Atte Kuttenen of OUSPG discovered a use-after-free issue in inline-block.
CVE-2013-2910
Byoungyoung Lee of the Georgia Tech Information Security Center discovered a use-after-free issue in Web Audio.
CVE-2013-2911
Atte Kettunen of OUSPG discovered a use-after-free in Blink's XSLT handling.
CVE-2013-2912
Chamal de Silva and 41.w4r10r(at)garage4hackers.com discovered a use-after-free issue in the Pepper Plug-in API.
CVE-2013-2913
cloudfuzzer discovered a use-after-free issue in Blink's XML document parsing.
CVE-2013-2915
Wander Groeneveld discovered an address bar spoofing issue.
CVE-2013-2916
Masato Kinugawa discovered an address bar spoofing issue.
CVE-2013-2917
Byoungyoung Lee and Tielei Wang discovered an out-of-bounds read issue in Web Audio.
CVE-2013-2918
Byoungyoung Lee discoverd an out-of-bounds read in Blink's DOM implementation.
CVE-2013-2919
Adam Haile of Concrete Data discovered a memory corruption issue in the V8 javascript library.
CVE-2013-2920
Atte Kuttunen of OUSPG discovered an out-of-bounds read in URL host resolving.
CVE-2013-2921
Byoungyoung Lee and Tielei Wang discovered a use-after-free issue in resource loading.
CVE-2013-2922
Jon Butler discovered a use-after-free issue in Blink's HTML template element implementation.
CVE-2013-2924
A use-after-free issue was discovered in the International Components for Unicode (ICU) library.
CVE-2013-2925
Atte Kettunen of OUSPG discover a use-after-free issue in Blink's XML HTTP request implementation.
CVE-2013-2926
cloudfuzzer discovered a use-after-free issue in the list indenting implementation.
CVE-2013-2927
cloudfuzzer discovered a use-after-free issue in the HTML form submission implementation.
CVE-2013-2923 and CVE-2013-2928
The chrome 30 development team found various issues from internal fuzzing, audits, and other studies.
For the stable distribution (wheezy), these problems have been fixed in version 30.0.1599.101-1~deb7u1.
For the testing distribution (jessie), these problems will be fixed soon.
For the unstable distribution (sid), these problems have been fixed in version 30.0.1599.101-1.
We recommend that you upgrade your chromium-browser packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux)
iQQcBAEBCgAGBQJSWwMrAAoJELjWss0C1vRzix8f/3u/oOLmR1/70gZliS/mbGYh MKCxR0BgS85CENIYujIlW1k+urYEnfjZkpDqzh41ExpgCos6NcncNtoP3apz2UDX 6g/qh/cbUC7eXUfXW/Z2/XFam9RtNoa9helhpuZ5RvyZ+A836CkEzCwigFOpgOMJ e/sPjgxwSpz3nlYR3VPG6dRMSOx0jFeickNZTHPm3DmuhmF3dvnKWKlmTvJ1LtC9 /GFHmdGckoVEVNMHD5v8FAlCwoRNAZ/WK/7h4Ro9/mc8Z9qJYB/7dUveiIAO73Qj JiOxI1hHjcCtsm3lUBmKe5/WDcTWeLz5IRTLfOMrxp0zZfYp858y2/tDDnqeNFn2 EVaKMsOZytVpF4ercGoszruDiKdnX8Uq6Ng44SssQf37FNDUOo9nrBghLyWnl8Kz 07MxAHzz4N8uy2UyjVTmzIYSP0s9ccRH6KgPxTfbWBdyb8Q/inKEU/7/XbBHKZSm Cqfh5jqIMcIuupg8wT20up4FvtcWSHrw2JmZxEQEsBn/wbNF+b67VNniUDFWgua7 LUmCmhJeZv+Zhjc4cHVliI5cGP03m4C/25dUplR9rofZ8VEG0vkPj6J3nyaEnCiS NY6Z3AfmntvRS50Vbrl+6v0BLjSjXeWPt2nRneQ+bEaCM8PX7wIPYBCczVxzzZrH 6nw7ngqrOCmwiuz0+2O777wmanWCAFimpaVwGNBqNxdfcywk16unIA+YU2AbHLeq anevGnQBbjyi9joO9gN67CCIBBVqmZ93DQHIUyjPNpuixtz9gzkunVdt9r+8OM3l Nom/ttW6foZ9NlLbg5tbYHtTrpZ/t8ng6it4AHmGM/QqGQmXZdYanNZ03ok3IFE7 lJNKGZb/TgwQms3dd3hXheOx8D3p8MclSyo81iaF5KAhsZ6bRVHM/u8hKtFZ8FIL nF3ppA0Y/HUZS1W9UweOJT0Vlxt8PNHn8YTHEhYUXX/HX5uDIdVVS4XSWCTxVYlu +qYYjDs7zs53hq1n1cSuhMYrqn30h275p1e3roCCDYDwg3/qs3MQ1DiL4qsSHMyy Sy2SL4mgX9rtIB42Ym2MWK76Q1ogrYl1B55O3rBmC5VMa0L3fZsWZv2rIzMrJclj HPybzv7myRkhRXar/+BvlkrPLssmEK65L/Jy5m0M0gNeV0G6sebxxnaQRYtc0Yru YNLcY+6xncuz86Gi26lYHb0slh/J7aDbPEsRLofHFYwoln7tb3M0+YU0CSqUUzu1 d51Yj2qrf/wSfM1UbNDhuWk+Kx6tKGvB3y54h+dsqOrKNqFWsApfCA0mOjzFAClr 6Dc9xnctxUgaDTg+mFx2KvyeaNp80U+QTRmGJPG200qUvG+cCYJZWv4E44jdw9E= =n1or -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: http://lists.debian.org/E1Va98X-0005UN-5s@alpha.psidef.org
|
|
|
|