Zero Day Initiative Advisory 11-104 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Webkit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WebKit library's implementation of a CSS style. When totaling the length of it's string elements, the library will store the result into a 32bit integer. This value will be used for an allocation and then later will be used to initialize the allocated buffer. Due to the number of elements being totaled being variable, this will allow an aggressor to provide as many elements as necessary in order to cause the integer value to wrap causing an under-allocation. Initialization of this data will then cause a heap-based buffer overflow. This can lead to code execution under the context of the application.
347cf5e231b4084b8fc7a2447d1f6527012477b05fa10b2f622c82dcfb76f440
This short advisory dictates how you can do a quick security check of your BlackBerry to see if you are vulnerable against various security issues.
93163bc6119f329fbf4bd60f854434065dea5ffed8fa876568b6e2956337925f
Debian Linux Security Advisory 2192-1 - Several vulnerabilities were discovered in the Chromium browser.
dbb012c0abe005cd462f09f549902be26e7acd1775451c3bfb0e1019e4e805d4