Debian Security Advisory DSA-2905-1 email@example.com http://www.debian.org/security/ Michael Gilbert April 15, 2014 http://www.debian.org/security/faq
Package : chromium-browser CVE ID : CVE-2014-1716 CVE-2014-1717 CVE-2014-1718 CVE-2014-1719 CVE-2014-1720 CVE-2014-1721 CVE-2014-1722 CVE-2014-1723 CVE-2014-1724 CVE-2014-1725 CVE-2014-1726 CVE-2014-1727 CVE-2014-1728 CVE-2014-1729
Several vulnerabilities were discovered in the chromium web browser.
Aaron Staple discovered an integer overflow issue in chromium's software compositor.
Colin Payne discovered a use-after-free issue in the web workers implementation.
cloudfuzzer discovered a use-after-free issue in the Blink/Webkit document object model implementation.
miaubiz discovered a use-after-free issue in block rendering.
George McBay discovered a url spoofing issue.
Atte Kettunen discovered a use-after-free issue in freebsoft's libspeechd library. Because of this issue, the text-to-speech feature is now disabled by default ("--enable-speech-dispatcher" at the command-line can re-enable it).
An out-of-bounds read was discovered in the base64 implementation.
Jann Horn discovered a way to bypass the same origin policy.
Khalil Zhani discovered a use-after-free issue in the web color chooser implementation.
The Google Chrome development team discovered and fixed multiple issues with potential security impact.
For the stable distribution (wheezy), these problems have been fixed in version 34.0.1847.116-1~deb7u1.
For the testing distribution (jessie), these problems will be fixed soon.
For the unstable distribution (sid), these problems have been fixed in version 34.0.1847.116-1.
We recommend that you upgrade your chromium-browser packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: firstname.lastname@example.org