Lucene search

K
freebsdFreeBSD6887828F-0229-11E0-B84D-00262D5ED8EE
HistoryOct 19, 2010 - 12:00 a.m.

chromium -- multiple vulnerabilities

2010-10-1900:00:00
vuxml.freebsd.org
23

0.451 Medium

EPSS

Percentile

97.4%

Google Chrome Releases reports:

Fixed in 15.0.874.121:
[103259] High CVE-2011-3900: Out-of-bounds write in v8. Credit to
Christian Holler.
Fixed in 15.0.874.120:
[100465] High CVE-2011-3892: Double free in Theora decoder. Credit
to Aki Helin of OUSPG.
[100492] [100543] Medium CVE-2011-3893: Out of bounds reads in MKV
and Vorbis media handlers. Credit to Aki Helin of OUSPG.
[101172] High CVE-2011-3894: Memory corruption regression in VP8
decoding. Credit to Andrew Scherkus of the Chromium development
community.
[101458] High CVE-2011-3895: Heap overflow in Vorbis decoder.
Credit to Aki Helin of OUSPG.
[101624] High CVE-2011-3896: Buffer overflow in shader variable
mapping. Credit to Ken “strcpy” Russell of the Chromium
development community.
[102242] High CVE-2011-3897: Use-after-free in editing. Credit to
pa_kt reported through ZDI (ZDI-CAN-1416).
[102461] Low CVE-2011-3898: Failure to ask for permission to run
applets in JRE7. Credit to Google Chrome Security Team (Chris
Evans).
Fixed in 15.0.874.102:
[86758] High CVE-2011-2845: URL bar spoof in history handling.
Credit to Jordi Chancel.
[88949] Medium CVE-2011-3875: URL bar spoof with drag+drop of URLs.
Credit to Jordi Chancel.
[90217] Low CVE-2011-3876: Avoid stripping whitespace at the end of
download filenames. Credit to Marc Novak.
[91218] Low CVE-2011-3877: XSS in appcache internals page. Credit
to Google Chrome Security Team (Tom Sepez) plus independent
discovery by Juho Nurminen.
[94487] Medium CVE-2011-3878: Race condition in worker process
initialization. Credit to miaubiz.
[95374] Low CVE-2011-3879: Avoid redirect to chrome scheme URIs.
Credit to Masato Kinugawa.
[95992] Low CVE-2011-3880: Don’t permit as a HTTP header delimiter.
Credit to Vladimir Vorontsov, ONsec company.
[96047] [96885] [98053] [99512] [99750] High CVE-2011-3881:
Cross-origin policy violations. Credit to Sergey Glazunov.
[96292] High CVE-2011-3882: Use-after-free in media buffer handling.
Credit to Google Chrome Security Team (Inferno).
[96902] High CVE-2011-3883: Use-after-free in counter handling.
Credit to miaubiz.
[97148] High CVE-2011-3884: Timing issues in DOM traversal. Credit
to Brian Ryner of the Chromium development community.
[97599] [98064] [98556] [99294] [99880] [100059] High CVE-2011-3885:
Stale style bugs leading to use-after-free. Credit to
miaubiz.
[98773] [99167] High CVE-2011-3886: Out of bounds writes in v8.
Credit to Christian Holler.
[98407] Medium CVE-2011-3887: Cookie theft with javascript URIs.
Credit to Sergey Glazunov.
[99138] High CVE-2011-3888: Use-after-free with plug-in and editing.
Credit to miaubiz.
[99211] High CVE-2011-3889: Heap overflow in Web Audio. Credit to
miaubiz.
[99553] High CVE-2011-3890: Use-after-free in video source handling.
Credit to Ami Fischman of the Chromium development community.
[100332] High CVE-2011-3891: Exposure of internal v8 functions.
Credit to Steven Keuchel of the Chromium development community
plus independent discovery by Daniel Divricean.
Fixed in 14.0.835.202:
[93788] High CVE-2011-2876: Use-after-free in text line box
handling. Credit to miaubiz.
[95072] High CVE-2011-2877: Stale font in SVG text handling. Credit
to miaubiz.
[95671] High CVE-2011-2878: Inappropriate cross-origin access to the
window prototype. Credit to Sergey Glazunov.
[96150] High CVE-2011-2879: Lifetime and threading issues in audio
node handling. Credit to Google Chrome Security Team
(Inferno).
[97451] [97520] [97615] High CVE-2011-2880: Use-after-free in the v8
bindings. Credit to Sergey Glazunov.
[97784] High CVE-2011-2881: Memory corruption with v8 hidden
objects. Credit to Sergey Glazunov.
[98089] Critical CVE-2011-3873: Memory corruption in shader
translator. Credit to Zhenyao Mo of the Chromium development
community.
Fixed in 14.0.835.163:
[49377] High CVE-2011-2835: Race condition in the certificate cache. Credit to Ryan Sleevi of the Chromium development community.
[51464] Low CVE-2011-2836: Infobar the Windows Media Player plug-in
to avoid click-free access to the system Flash. Credit to
electronixtar.
[Linux only] [57908] Low CVE-2011-2837: Use PIC / pie compiler
flags. Credit to wbrana.
[75070] Low CVE-2011-2838: Treat MIME type more authoritatively when
loading plug-ins. Credit to Michal Zalewski of the Google Security
Team.
[76771] High CVE-2011-2839: Crash in v8 script object wrappers.
Credit to Kostya Serebryany of the Chromium development
community.
[78427] [83031] Low CVE-2011-2840: Possible URL bar spoofs with
unusual user interaction. Credit to kuzzcc.
[78639] High CVE-2011-2841: Garbage collection error in PDF. Credit
to Mario Gomes.
[82438] Medium CVE-2011-2843: Out-of-bounds read with media buffers.
Credit to Kostya Serebryany of the Chromium development
community.
[85041] Medium CVE-2011-2844: Out-of-bounds read with mp3 files.
Credit to Mario Gomes.
[89219] High CVE-2011-2846: Use-after-free in unload event handling.
Credit to Arthur Gerkis.
[89330] High CVE-2011-2847: Use-after-free in document loader.
Credit to miaubiz.
[89564] Medium CVE-2011-2848: URL bar spoof with forward button.
Credit to Jordi Chancel.
[89795] Low CVE-2011-2849: Browser NULL pointer crash with
WebSockets. Credit to Arthur Gerkis.
[89991] Medium CVE-2011-3234: Out-of-bounds read in box handling.
Credit to miaubiz.
[90134] Medium CVE-2011-2850: Out-of-bounds read with Khmer
characters. Credit to miaubiz.
[90173] Medium CVE-2011-2851: Out-of-bounds read in video handling.
Credit to Google Chrome Security Team (Inferno).
[91120] High CVE-2011-2852: Off-by-one in v8. Credit to Christian
Holler.
[91197] High CVE-2011-2853: Use-after-free in plug-in handling.
Credit to Google Chrome Security Team (SkyLined).
[92651] [94800] High CVE-2011-2854: Use-after-free in ruby / table
style handing. Credit to Slawomir Blazek, and independent later
discoveries by miaubiz and Google Chrome Security Team
(Inferno).
[92959] High CVE-2011-2855: Stale node in stylesheet handling.
Credit to Arthur Gerkis.
[93416] High CVE-2011-2856: Cross-origin bypass in v8. Credit to
Daniel Divricean.
[93420] High CVE-2011-2857: Use-after-free in focus controller.
Credit to miaubiz.
[93472] High CVE-2011-2834: Double free in libxml XPath handling.
Credit to Yang Dingning from NCNIPC, Graduate University of
Chinese Academy of Sciences.
[93497] Medium CVE-2011-2859: Incorrect permissions assigned to
non-gallery pages. Credit to Bernhard “Bruhns” Brehm of Recurity
Labs.
[93587] High CVE-2011-2860: Use-after-free in table style handling.
Credit to miaubiz.
[93596] Medium CVE-2011-2861: Bad string read in PDF. Credit to Aki
Helin of OUSPG.
[93906] High CVE-2011-2862: Unintended access to v8 built-in
objects. Credit to Sergey Glazunov.
[95563] Medium CVE-2011-2864: Out-of-bounds read with Tibetan
characters. Credit to Google Chrome Security Team (Inferno).
[95625] Medium CVE-2011-2858: Out-of-bounds read with triangle
arrays. Credit to Google Chrome Security Team (Inferno).
[95917] Low CVE-2011-2874: Failure to pin a self-signed cert for a
session. Credit to Nishant Yadant of VMware and Craig Chamberlain
(@randomuserid).
High CVE-2011-2875: Type confusion in v8 object sealing. Credit to
Christian Holler.
Fixed in 13.0.782.215:
[89402] High CVE-2011-2821: Double free in libxml XPath handling.
Credit to Yang Dingning from NCNIPC, Graduate University of
Chinese Academy of Sciences.
[82552] High CVE-2011-2823: Use-after-free in line box handling.
Credit to Google Chrome Security Team (SkyLined) and independent
later discovery by miaubiz.
[88216] High CVE-2011-2824: Use-after-free with counter nodes.
Credit to miaubiz.
[88670] High CVE-2011-2825: Use-after-free with custom fonts. Credit
to wushi of team509 reported through ZDI (ZDI-CAN-1283), plus
indepdendent later discovery by miaubiz.
[87453] High CVE-2011-2826: Cross-origin violation with empty
origins. Credit to Sergey Glazunov.
[90668] High CVE-2011-2827: Use-after-free in text searching. Credit
to miaubiz.
[91517] High CVE-2011-2828: Out-of-bounds write in v8. Credit to
Google Chrome Security Team (SkyLined).
[32-bit only] [91598] High CVE-2011-2829: Integer overflow in
uniform arrays. Credit to Sergey Glazunov.
[Linux only] [91665] High CVE-2011-2839: Buggy memset() in PDF.
Credit to Aki Helin of OUSPG.
Fixed in 13.0.782.107:
[75821] Medium CVE-2011-2358: Always confirm an extension install
via a browser dialog. Credit to Sergey Glazunov.
[78841] High CVE-2011-2359: Stale pointer due to bad line box
tracking in rendering. Credit to miaubiz and Martin Barbella.
[79266] Low CVE-2011-2360: Potential bypass of dangerous file
prompt. Credit to kuzzcc.
[79426] Low CVE-2011-2361: Improve designation of strings in the
basic auth dialog. Credit to kuzzcc.
[Linux only] [81307] Medium CVE-2011-2782: File permissions error
with drag and drop. Credit to Evan Martin of the Chromium
development community.
[83273] Medium CVE-2011-2783: Always confirm a developer mode NPAPI
extension install via a browser dialog. Credit to Sergey
Glazunov.
[83841] Low CVE-2011-2784: Local file path disclosure via GL
program log. Credit to kuzzcc.
[84402] Low CVE-2011-2785: Sanitize the homepage URL in extensions.
Credit to kuzzcc.
[84600] Low CVE-2011-2786: Make sure the speech input bubble is
always on-screen. Credit to Olli Pettay of Mozilla.
[84805] Medium CVE-2011-2787: Browser crash due to GPU lock
re-entrancy issue. Credit to kuzzcc.
[85559] Low CVE-2011-2788: Buffer overflow in inspector
serialization. Credit to Mikolaj Malecki.
[85808] Medium CVE-2011-2789: Use after free in Pepper plug-in
instantiation. Credit to Mario Gomes and kuzzcc.
[86502] High CVE-2011-2790: Use-after-free with floating styles.
Credit to miaubiz.
[86900] High CVE-2011-2791: Out-of-bounds write in ICU. Credit to
Yang Dingning from NCNIPC, Graduate University of Chinese Academy
of Sciences.
[87148] High CVE-2011-2792: Use-after-free with float removal.
Credit to miaubiz.
[87227] High CVE-2011-2793: Use-after-free in media selectors.
Credit to miaubiz.
[87298] Medium CVE-2011-2794: Out-of-bounds read in text iteration.
Credit to miaubiz.
[87339] Medium CVE-2011-2795: Cross-frame function leak. Credit to
Shih Wei-Long.
[87548] High CVE-2011-2796: Use-after-free in Skia. Credit to Google
Chrome Security Team (Inferno) and Kostya Serebryany of the
Chromium development community.
[87729] High CVE-2011-2797: Use-after-free in resource caching.
Credit to miaubiz.
[87815] Low CVE-2011-2798: Prevent a couple of internal schemes from
being web accessible. Credit to sirdarckcat of the Google Security
Team.
[87925] High CVE-2011-2799: Use-after-free in HTML range handling.
Credit to miaubiz.
[88337] Medium CVE-2011-2800: Leak of client-side redirect target.
Credit to Juho Nurminen.
[88591] High CVE-2011-2802: v8 crash with const lookups. Credit to
Christian Holler.
[88827] Medium CVE-2011-2803: Out-of-bounds read in Skia paths.
Credit to Google Chrome Security Team (Inferno).
[88846] High CVE-2011-2801: Use-after-free in frame loader. Credit
to miaubiz.
[88889] High CVE-2011-2818: Use-after-free in display box rendering.
Credit to Martin Barbella.
[89142] High CVE-2011-2804: PDF crash with nested functions. Credit
to Aki Helin of OUSPG.
[89520] High CVE-2011-2805: Cross-origin script injection. Credit to
Sergey Glazunov.
[90222] High CVE-2011-2819: Cross-origin violation in base URI
handling. Credit to Sergey Glazunov.
Fixed in 12.0.742.112:
[77493] Medium CVE-2011-2345: Out-of-bounds read in NPAPI string
handling. Credit to Philippe Arteau.
[84355] High CVE-2011-2346: Use-after-free in SVG font handling.
Credit to miaubiz.
[85003] High CVE-2011-2347: Memory corruption in CSS parsing. Credit
to miaubiz.
[85102] High CVE-2011-2350: Lifetime and re-entrancy issues in the
HTML parser. Credit to miaubiz.
[85177] High CVE-2011-2348: Bad bounds check in v8. Credit to Aki
Helin of OUSPG.
[85211] High CVE-2011-2351: Use-after-free with SVG use element.
Credit to miaubiz.
[85418] High CVE-2011-2349: Use-after-free in text selection. Credit
to miaubiz.
Fixed in 12.0.742.91:
[73962] [79746] High CVE-2011-1808: Use-after-free due to integer
issues in float handling. Credit to miaubiz.
[75496] Medium CVE-2011-1809: Use-after-free in accessibility
support. Credit to Google Chrome Security Team (SkyLined).
[75643] Low CVE-2011-1810: Visit history information leak in CSS.
Credit to Jesse Mohrland of Microsoft and Microsoft Vulnerability
Research (MSVR).
[76034] Low CVE-2011-1811: Browser crash with lots of form
submissions. Credit to “DimitrisV22”.
[77026] Medium CVE-2011-1812: Extensions permission bypass. Credit
to kuzzcc.
[78516] High CVE-2011-1813: Stale pointer in extension framework.
Credit to Google Chrome Security Team (Inferno).
[79362] Medium CVE-2011-1814: Read from uninitialized pointer.
Credit to Eric Roman of the Chromium development community.
[79862] Low CVE-2011-1815: Extension script injection into new tab
page. Credit to kuzzcc.
[80358] Medium CVE-2011-1816: Use-after-free in developer tools.
Credit to kuzzcc.
[81916] Medium CVE-2011-1817: Browser memory corruption in history
deletion. Credit to Collin Payne.
[81949] High CVE-2011-1818: Use-after-free in image loader. Credit
to miaubiz.
[83010] Medium CVE-2011-1819: Extension injection into chrome://
pages. Credit to Vladislavas Jarmalis, plus subsequent
independent discovery by Sergey Glazunov.
[83275] High CVE-2011-2332: Same origin bypass in v8. Credit to
Sergey Glazunov.
[83743] High CVE-2011-2342: Same origin bypass in DOM. Credit to
Sergey Glazunov.
Fixed in 11.0.696.71:
[72189] Low CVE-2011-1801: Pop-up blocker bypass. Credit to Chamal
De Silva.
[82546] High CVE-2011-1804: Stale pointer in floats rendering.
Credit to Martin Barbella.
[82873] Critical CVE-2011-1806: Memory corruption in GPU command
buffer. Credit to Google Chrome Security Team (Cris Neckar).
[82903] Critical CVE-2011-1807: Out-of-bounds write in blob
handling. Credit to Google Chrome Security Team (Inferno) and
Kostya Serebryany of the Chromium development community.
Fixed in 11.0.696.68:
[64046] High CVE-2011-1799: Bad casts in Chromium WebKit glue.
Credit to Google Chrome Security Team (SkyLined).
[80608] High CVE-2011-1800: Integer overflows in SVG filters.
Credit to Google Chrome Security Team (Cris Neckar).
Fixed in 11.0.696.57:
[61502] High CVE-2011-1303: Stale pointer in floating object
handling. Credit to Scott Hess of the Chromium development
community and Martin Barbella.
[70538] Low CVE-2011-1304: Pop-up block bypass via plug-ins. Credit
to Chamal De Silva.
[Linux / Mac only] [70589] Medium CVE-2011-1305: Linked-list race
in database handling. Credit to Kostya Serebryany of the
Chromium development community.
[71586] Medium CVE-2011-1434: Lack of thread safety in MIME
handling. Credit to Aki Helin.
[72523] Medium CVE-2011-1435: Bad extension with “tabs” permission
can capture local files. Credit to Cole Snodgrass.
[Linux only] [72910] Low CVE-2011-1436: Possible browser crash due
to bad interaction with X. Credit to miaubiz.
[73526] High CVE-2011-1437: Integer overflows in float rendering.
Credit to miaubiz.
[74653] High CVE-2011-1438: Same origin policy violation with
blobs. Credit to kuzzcc.
[Linux only] [74763] High CVE-2011-1439: Prevent interference
between renderer processes. Credit to Julien Tinnes of the
Google Security Team.
[75186] High CVE-2011-1440: Use-after-free with <ruby> tag
and CSS. Credit to Jose A. Vazquez.
[75347] High CVE-2011-1441: Bad cast with floating select lists.
Credit to Michael Griffiths.
[75801] High CVE-2011-1442: Corrupt node trees with mutation events.
Credit to Sergey Glazunov and wushi of team 509.
[76001] High CVE-2011-1443: Stale pointers in layering code. Credit
to Martin Barbella.
[Linux only] [76542] High CVE-2011-1444: Race condition in sandbox
launcher. Credit to Dan Rosenberg.
Medium CVE-2011-1445: Out-of-bounds read in SVG. Credit to wushi of
team509.
[76666] [77507] [78031] High CVE-2011-1446: Possible URL bar spoofs
with navigation errors and interrupted loads. Credit to
kuzzcc.
[76966] High CVE-2011-1447: Stale pointer in drop-down list
handling. Credit to miaubiz.
[77130] High CVE-2011-1448: Stale pointer in height calculations.
Credit to wushi of team509.
[77346] High CVE-2011-1449: Use-after-free in WebSockets. Credit to
Marek Majkowski.
Low CVE-2011-1450: Dangling pointers in file dialogs. Credit to
kuzzcc.
[77463] High CVE-2011-1451: Dangling pointers in DOM id map. Credit
to Sergey Glazunov.
[77786] Medium CVE-2011-1452: URL bar spoof with redirect and manual
reload. Credit to Jordi Chancel.
[79199] High CVE-2011-1454: Use-after-free in DOM id handling.
Credit to Sergey Glazunov.
[79361] Medium CVE-2011-1455: Out-of-bounds read with
multipart-encoded PDF. Credit to Eric Roman of the Chromium
development community.
[79364] High CVE-2011-1456: Stale pointers with PDF forms. Credit to
Eric Roman of the Chromium development community.
Fixed in 10.0.648.205:
[75629] Critical CVE-2011-1301: Use-after-free in the GPU process.
Credit to Google Chrome Security Team (Inferno).
[78524] Critical CVE-2011-1302: Heap overflow in the GPU process.
Credit to Christoph Diehl.
Fixed in 10.0.648.204:
[72517] High CVE-2011-1291: Buffer error in base string handling.
Credit to Alex Turpin.
[73216] High CVE-2011-1292: Use-after-free in the frame loader.
Credit to Slawomir Blazek.
[73595] High CVE-2011-1293: Use-after-free in HTMLCollection.
Credit to Sergey Glazunov.
[74562] High CVE-2011-1294: Stale pointer in CSS handling.
Credit to Sergey Glazunov.
[74991] High CVE-2011-1295: DOM tree corruption with broken node
parentage. Credit to Sergey Glazunov.
[75170] High CVE-2011-1296: Stale pointer in SVG text handling.
Credit to Sergey Glazunov.
Fixed in 10.0.648.133:
[75712] High Memory corruption in style handling.
Credit to Vincenzo Iozzo, Ralf Philipp Weinmann and Willem
Pinckaers reported through ZDI.
Fixed in 10.0.648.127:
[42765] Low Possible to navigate or close the top location in a
sandboxed frame. Credit to sirdarckcat of the Google Security
Team.
[Linux only] [49747] Low Work around an X server bug and crash with
long messages. Credit to Louis Lang.
[Linux only] [66962] Low Possible browser crash with parallel
print()s. Credit to Aki Helin of OUSPG.
[69187] Medium Cross-origin error message leak. Credit to Daniel
Divricean.
[69628] High Memory corruption with counter nodes. Credit to Martin
Barbella.
[70027] High Stale node in box layout. Credit to Martin
Barbella.
[70336] Medium Cross-origin error message leak with workers. Credit
to Daniel Divricean.
[70442] High Use after free with DOM URL handling. Credit to Sergey
Glazunov.
[Linux only] [70779] Medium Out of bounds read handling unicode
ranges. Credit to miaubiz.
[70877] High Same origin policy bypass in v8. Credit to Daniel
Divricean.
[70885] [71167] Low Pop-up blocker bypasses. Credit to Chamal de
Silva.
[71763] High Use-after-free in document script lifetime handling.
Credit to miaubiz.
[71788] High Out-of-bounds write in the OGG container. Credit to
Google Chrome Security Team (SkyLined); plus subsequent
independent discovery by David Weston of Microsoft and MSVR.
[72028] High Stale pointer in table painting. Credit to Martin
Barbella.
[73026] High Use of corrupt out-of-bounds structure in video code.
Credit to Tavis Ormandy of the Google Security Team.
[73066] High Crash with the DataView object. Credit to Sergey
Glazunov.
[73134] High Bad cast in text rendering. Credit to miaubiz.
[73196] High Stale pointer in WebKit context code. Credit to Sergey
Glazunov.
[73716] Low Leak of heap address in XSLT. Credit to Google Chrome
Security Team (Chris Evans).
[73746] High Stale pointer with SVG cursors. Credit to Sergey
Glazunov.
[74030] High DOM tree corruption with attribute handling. Credit to
Sergey Glazunov.
[74662] High Corruption via re-entrancy of RegExp code. Credit to
Christian Holler.
[74675] High Invalid memory access in v8. Credit to Christian
Holler.
Fixed in 9.0.597.107:
[54262] High URL bar spoof. Credit to Jordi Chancel.
[63732] High Crash with javascript dialogs. Credit to Sergey
Radchenko.
[68263] High Stylesheet node stale pointer. Credit to Sergey
Glazunov.
[68741] High Stale pointer with key frame rule. Credit to Sergey
Glazunov.
[70078] High Crash with forms controls. Credit to Stefan van
Zanden.
[70244] High Crash in SVG rendering. Credit to Slawomir Blazek.
[64-bit Linux only] [70376] Medium Out-of-bounds read in pickle
deserialization. Credit to Evgeniy Stepanov of the Chromium
development community.
[71114] High Stale node in table handling. Credit to Martin
Barbella.
[71115] High Stale pointer in table rendering. Credit to Martin
Barbella.
[71296] High Stale pointer in SVG animations. Credit to
miaubiz.
[71386] High Stale nodes in XHTML. Credit to wushi of team509.
[71388] High Crash in textarea handling. Credit to wushi of
team509.
[71595] High Stale pointer in device orientation. Credit to Sergey
Glazunov.
[71717] Medium Out-of-bounds read in WebGL. Credit to miaubiz.
[71855] High Integer overflow in textarea handling. Credit to
miaubiz.
[71960] Medium Out-of-bounds read in WebGL. Credit to Google Chrome
Security Team (Inferno).
[72214] High Accidental exposure of internal extension functions.
Credit to Tavis Ormandy of the Google Security Team.
[72437] High Use-after-free with blocked plug-ins. Credit to Chamal
de Silva.
[73235] High Stale pointer in layout. Credit to Martin Barbella.
Fixed in 9.0.597.94:
[67234] High Stale pointer in animation event handling. Credit to
Rik Cabanier.
[68120] High Use-after-free in SVG font faces. Credit to
miaubiz.
[69556] High Stale pointer with anonymous block handling. Credit to
Martin Barbella.
[69970] Medium Out-of-bounds read in plug-in handling. Credit to
Bill Budge of Google.
[70456] Medium Possible failure to terminate process on
out-of-memory condition. Credit to David Warren of CERT/CC.
Fixed in 9.0.597.84:
[Mac only] [42989] Low Minor sandbox leak via stat(). Credit to
Daniel Cheng of the Chromium development community.
[55831] High Use-after-free in image loading. Credit to Aki
Helin of OUSPG.
[59081] Low Apply some restrictions to cross-origin drag + drop.
Credit to Google Chrome Security Team (SkyLined) and the Google
Security Team (Michal Zalewski, David Bloom).
[62791] Low Browser crash with extension with missing key. Credit
to Brian Kirchoff.
[64051] High Crashing when printing in PDF event handler. Credit to
Aki Helin of OUSPG.
[65669] Low Handle merging of autofill profiles more gracefully.
Credit to Google Chrome Security Team (Inferno).
[Mac only] [66931] Low Work around a crash in the Mac OS 10.5 SSL
libraries. Credit to Dan Morrison.
[68244] Low Browser crash with bad volume setting. Credit to
Matthew Heidermann.
[69195] Critical Race condition in audio handling. Credit to the
gamers of Reddit!
Fixed in 8.0.552.237:
[58053] Medium Browser crash in extensions notification handling.
Credit to Eric Roman of the Chromium development community.
[65764] High Bad pointer handling in node iteration. Credit to
Sergey Glazunov.
[66334] High Crashes when printing multi-page PDFs. Credit to
Google Chrome Security Team (Chris Evans).
[66560] High Stale pointer with CSS + canvas. Credit to Sergey
Glazunov.
[66748] High Stale pointer with CSS + cursors. Credit to Jan
Tosovsk.
[67100] High Use after free in PDF page handling. Credit to Google
Chrome Security Team (Chris Evans).
[67208] High Stack corruption after PDF out-of-memory condition.
Credit to Jared Allar of CERT.
[67303] High Bad memory access with mismatched video frame sizes.
Credit to Aki Helin of OUSPG; plus independent discovery by
Google Chrome Security Team (SkyLined) and David Warren of
CERT.
[67363] High Stale pointer with SVG use element. Credited
anonymously; plus indepdent discovery by miaubiz.
[67393] Medium Uninitialized pointer in the browser triggered by
rogue extension. Credit to kuzzcc.
[68115] High Vorbis decoder buffer overflows. Credit to David
Warren of CERT.
[68170] High Buffer overflow in PDF shading. Credit to Aki Helin of
OUSPG.
[68178] High Bad cast in anchor handling. Credit to Sergey
Glazunov.
[68181] High Bad cast in video handling. Credit to Sergey
Glazunov.
[68439] High Stale rendering node after DOM node removal. Credit to
Martin Barbella; plus independent discovery by Google Chrome
Security Team (SkyLined).
[68666] Critical Stale pointer in speech handling. Credit to Sergey
Glazunov.
Fixed in 8.0.552.224:
[64-bit Linux only] [56449] High Bad validation for message
deserialization on 64-bit builds. Credit to Lei Zhang of the
Chromium development community.
[60761] Medium Bad extension can cause browser crash in tab
handling. Credit to kuzzcc.
[63529] Low Browser crash with NULL pointer in web worker handling.
Credit to Nathan Weizenbaum of Google.
[63866] Medium Out-of-bounds read in CSS parsing. Credit to Chris
Rohlf.
[64959] High Stale pointers in cursor handling. Credit to Slawomir
Blazek and Sergey Glazunov.
Fixed in 8.0.552.215:
[17655] Low Possible pop-up blocker bypass. Credit to Google Chrome
Security Team (SkyLined).
[55745] Medium Cross-origin video theft with canvas. Credit to
Nirankush Panchbhai and Microsoft Vulnerability Research
(MSVR).
[56237] Low Browser crash with HTML5 databases. Credit to Google
Chrome Security Team (Inferno).
[58319] Low Prevent excessive file dialogs, possibly leading to
browser crash. Credit to Cezary Tomczak (gosu.pl).
[59554] High Use after free in history handling. Credit to Stefan
Troger.
[Linux / Mac] [59817] Medium Make sure the “dangerous file types”
list is uptodate with the Windows platforms. Credit to Billy Rios
of the Google Security Team.
[61701] Low Browser crash with HTTP proxy authentication. Credit to
Mohammed Bouhlel.
[61653] Medium Out-of-bounds read regression in WebM video support.
Credit to Google Chrome Security Team (Chris Evans), based on
earlier testcases from Mozilla and Microsoft (MSVR).
[62127] High Crash due to bad indexing with malformed video. Credit
to miaubiz.
[62168] Medium Possible browser memory corruption via malicious
privileged extension. Credit to kuzzcc.
[62401] High Use after free with SVG animations. Credit to Slawomir
Blazek.
[63051] Medium Use after free in mouse dragging event handling.
Credit to kuzzcc.
[63444] High Double free in XPath handling. Credit to Yang Dingning
from NCNIPC, Graduate University of Chinese Academy of Sciences.
Fixed in 7.0.517.44:
[51602] High Use-after-free in text editing. Credit to David Bloom
of the Google Security Team, Google Chrome Security Team (Inferno)
and Google Chrome Security Team (Cris Neckar).
[55257] High Memory corruption with enormous text area. Credit to
wushi of team509.
[58657] High Bad cast with the SVG use element. Credit to the
kuzzcc.
[58731] High Invalid memory read in XPath handling. Credit to Bui
Quang Minh from Bkis (www.bkis.com).
[58741] High Use-after-free in text control selections. Credit to
“vkouchna”.
[Linux only] [59320] High Integer overflows in font handling. Credit
to Aki Helin of OUSPG.
[60055] High Memory corruption in libvpx. Credit to Christoph
Diehl.
[60238] High Bad use of destroyed frame object. Credit to various
developers, including “gundlach”.
[60327] [60769] [61255] High Type confusions with event objects.
Credit to “fam.lam” and Google Chrome Security Team
(Inferno).
[60688] High Out-of-bounds array access in SVG handling. Credit to
wushi of team509.
Fixed in 7.0.517.43:
[48225] [51727] Medium Possible autofill / autocomplete profile
spamming. Credit to Google Chrome Security Team (Inferno).
[48857] High Crash with forms. Credit to the Chromium development
community.
[50428] Critical Browser crash with form autofill. Credit to the
Chromium development community.
[51680] High Possible URL spoofing on page unload. Credit to kuzzcc;
plus independent discovery by Jordi Chancel.
[53002] Low Pop-up block bypass. Credit to kuzzcc.
[53985] Medium Crash on shutdown with Web Sockets. Credit to the
Chromium development community.
[Linux only] [54132] Low Bad construction of PATH variable. Credit
to Dan Rosenberg, Virtual Security Research.
[54500] High Possible memory corruption with animated GIF. Credit to
Simon Schaak.
[Linux only] [54794] High Failure to sandbox worker processes on
Linux. Credit to Google Chrome Security Team (Chris Evans).
[56451] High Stale elements in an element map. Credit to Michal
Zalewski of the Google Security Team.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchchromium< 15.0.874.121UNKNOWN