Debian Security Advisory
DSA-2905-1 chromium-browser -- security update
- Date Reported:
- 15 Apr 2014
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2014-1716, CVE-2014-1717, CVE-2014-1718, CVE-2014-1719, CVE-2014-1720, CVE-2014-1721, CVE-2014-1722, CVE-2014-1723, CVE-2014-1724, CVE-2014-1725, CVE-2014-1726, CVE-2014-1727, CVE-2014-1728, CVE-2014-1729.
- More information:
Several vulnerabilities were discovered in the chromium web browser.
Aaron Staple discovered an integer overflow issue in chromium's software compositor.
Colin Payne discovered a use-after-free issue in the web workers implementation.
cloudfuzzer discovered a use-after-free issue in the Blink/Webkit document object model implementation.
miaubiz discovered a use-after-free issue in block rendering.
George McBay discovered a url spoofing issue.
Atte Kettunen discovered a use-after-free issue in freebsoft's libspeechd library.
Because of this issue, the text-to-speech feature is now disabled by default ("--enable-speech-dispatcher" at the command-line can re-enable it).
An out-of-bounds read was discovered in the base64 implementation.
Jann Horn discovered a way to bypass the same origin policy.
Khalil Zhani discovered a use-after-free issue in the web color chooser implementation.
The Google Chrome development team discovered and fixed multiple issues with potential security impact.
For the stable distribution (wheezy), these problems have been fixed in version 34.0.1847.116-1~deb7u1.
For the testing distribution (jessie), these problems will be fixed soon.
For the unstable distribution (sid), these problems have been fixed in version 34.0.1847.116-1.
We recommend that you upgrade your chromium-browser packages.