exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3039-1

Debian Security Advisory 3039-1
Posted Sep 30, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3039-1 - Several vulnerabilities were discovered in the chromium web browser.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2014-3160, CVE-2014-3162, CVE-2014-3165, CVE-2014-3166, CVE-2014-3167, CVE-2014-3168, CVE-2014-3169, CVE-2014-3170, CVE-2014-3171, CVE-2014-3172, CVE-2014-3173, CVE-2014-3174, CVE-2014-3175, CVE-2014-3176, CVE-2014-3177, CVE-2014-3178, CVE-2014-3179
SHA-256 | 9d7dce82ec560fe8e43f44a49daa9e855df5ce9cc144ec3e17f25f65486f5adc

Debian Security Advisory 3039-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3039-1 security@debian.org
http://www.debian.org/security/ Michael Gilbert
September 28, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : chromium-browser
CVE ID : CVE-2014-3160 CVE-2014-3162 CVE-2014-3165 CVE-2014-3166
CVE-2014-3167 CVE-2014-3168 CVE-2014-3169 CVE-2014-3170
CVE-2014-3171 CVE-2014-3172 CVE-2014-3173 CVE-2014-3174
CVE-2014-3175 CVE-2014-3176 CVE-2014-3177 CVE-2014-3178
CVE-2014-3179

Several vulnerabilities were discovered in the chromium web browser.

CVE-2014-3160

Christian Schneider discovered a same origin bypass issue in SVG
file resource fetching.

CVE-2014-3162

The Google Chrome development team addressed multiple issues with
potential security impact for chromium 36.0.1985.125.

CVE-2014-3165

Colin Payne discovered a use-after-free issue in the Web Sockets
implementation.

CVE-2014-3166

Antoine Delignat-Lavaud discovered an information leak in the SPDY
protocol implementation.

CVE-2014-3167

The Google Chrome development team addressed multiple issues with
potential security impact for chromium 36.0.1985.143.

CVE-2014-3168

cloudfuzzer discovered a use-after-free issue in SVG image file
handling.

CVE-2014-3169

Andrzej Dyjak discovered a use-after-free issue in the Webkit/Blink
Document Object Model implementation.

CVE-2014-3170

Rob Wu discovered a way to spoof the url of chromium extensions.

CVE-2014-3171

cloudfuzzer discovered a use-after-free issue in chromium's v8
bindings.

CVE-2014-3172

Eli Grey discovered a way to bypass access restrictions using
chromium's Debugger extension API.

CVE-2014-3173

jmuizelaar discovered an uninitialized read issue in WebGL.

CVE-2014-3174

Atte Kettunen discovered an uninitialized read issue in Web Audio.

CVE-2014-3175

The Google Chrome development team addressed multiple issues with
potential security impact for chromium 37.0.2062.94.

CVE-2014-3176

lokihardt@asrt discovered a combination of flaws that can lead to
remote code execution outside of chromium's sandbox.

CVE-2014-3177

lokihardt@asrt discovered a combination of flaws that can lead to
remote code execution outside of chromium's sandbox.

CVE-2014-3178

miaubiz discovered a use-after-free issue in the Document Object
Model implementation in Blink/Webkit.

CVE-2014-3179

The Google Chrome development team addressed multiple issues with
potential security impact for chromium 37.0.2062.120.

For the stable distribution (wheezy), these problems have been fixed in
version 37.0.2062.120-1~deb7u1.

For the testing (jessie) and unstable (sid) distributions, these
problems have been fixed in version 37.0.2062.120-1.

We recommend that you upgrade your chromium-browser packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=
=pGsl
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close