Lucene search

K
debianDebianDEBIAN:DSA-2811-1:796EC
HistoryDec 08, 2013 - 3:57 a.m.

[SECURITY] [DSA 2811-1] chromium-browser security update

2013-12-0803:57:17
lists.debian.org
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P


Debian Security Advisory DSA-2811-1 [email protected]
http://www.debian.org/security/ Michael Gilbert
December 07, 2013 http://www.debian.org/security/faq


Package : chromium-browser
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE ID : CVE-2013-6634 CVE-2013-6635 CVE-2013-6636 CVE-2013-6637
CVE-2013-6638 CVE-2013-6639 CVE-2013-6640

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2013-6634

Andrey Labunets discovered that the wrong URL was used during
validation in the one-click sign on helper.

CVE-2013-6635

cloudfuzzer discovered use-after-free issues in the InsertHTML and
Indent DOM editing commands.

CVE-2013-6636

Bas Venis discovered an address bar spoofing issue.

CVE-2013-6637

The chrome 31 development team discovered and fixed multiple issues
with potential security impact.

CVE-2013-6638

Jakob Kummerow of the Chromium project discoved a buffer overflow in
the v8 javascript library.

CVE-2013-6639

Jakob Kummerow of the Chromium project discoved an out-of-bounds
write in the v8 javascript library.

CVE-2013-6640

Jakob Kummerow of the Chromium project discoved an out-of-bounds
read in the v8 javascript library.

For the stable distribution (wheezy), these problems have been fixed in
version 31.0.1650.63-1~deb7u1.

For the testing distribution (jessie), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 31.0.1650.63-1.

We recommend that you upgrade your chromium-browser packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P