Lucene search

K
debianDebianDEBIAN:DSA-2741-1:0FA8C
HistoryAug 25, 2013 - 8:47 p.m.

[SECURITY] [DSA 2741-1] chromium-browser security update

2013-08-2520:47:19
lists.debian.org
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P


Debian Security Advisory DSA-2741-1 [email protected]
http://www.debian.org/security/ Michael Gilbert
August 25, 2013 http://www.debian.org/security/faq


Package : chromium-browser
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902
CVE-2013-2903 CVE-2013-2904 CVE-2013-2905

Several vulnerabilities have been discovered in the Chromium web browser.

CVE-2013-2887

The chrome 29 development team found various issues from internal
fuzzing, audits, and other studies.

CVE-2013-2900

Krystian Bigaj discovered a file handling path sanitization issue.

CVE-2013-2901

Alex Chapman discovered an integer overflow issue in ANGLE, the
Almost Native Graphics Layer.

CVE-2013-2902

cloudfuzzer discovered a use-after-free issue in XSLT.

CVE-2013-2903

cloudfuzzer discovered a use-after-free issue in HTMLMediaElement.

CVE-2013-2904

cloudfuzzer discovered a use-after-free issue in XML document
parsing.

CVE-2013-2905

Christian Jaeger discovered an information leak due to insufficient
file permissions.

For the stable distribution (wheezy), these problems have been fixed in
version 29.0.1547.57-1~deb7u1.

For the testing distribution (jessie), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 29.0.1547.57-1.

We recommend that you upgrade your chromium-browser packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P