*** This bug is a security vulnerability ***

Public security bug reported:

And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.com/2013/07/stable-channel-
update.html

Here are the CVEs:

CVE-2013-2853: Man-in-the-middle attack against HTTP in SSL.
CVE-2013-2867: Block pop-unders in various scenarios. 
CVE-2013-2868: Incorrect sync of NPAPI extension component. 
CVE-2013-2869: Out-of-bounds read in JPEG2000 handling. 
CVE-2013-2870: Use-after-free with network sockets. 
CVE-2013-2871: Use-after-free in input handling.
CVE-2013-2872: Possible lack of entropy in renderers.
CVE-2013-2873: Use-after-free in resource loading.
CVE-2013-2874: Screen data leak with GL textures.
CVE-2013-2875: Out-of-bounds-read in SVG.
CVE-2013-2876: Extensions permissions confusion with interstitials.
CVE-2013-2877: Out-of-bounds read in XML parsing.
CVE-2013-2878: Out-of-bounds read in text handling.
CVE-2013-2879: Confusion setting up sign-in and sync.

** Affects: chromium-browser (Ubuntu)
     Importance: Undecided
         Status: New

** Information type changed from Private Security to Public Security

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2853

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2867

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2868

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2869

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2870

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2871

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2872

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2873

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2874

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2875

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2876

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2877

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2878

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-2879

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1199644

Title:
  Please update to 28.0.1500.71

Status in “chromium-browser” package in Ubuntu:
  New

Bug description:
  And again a new stable release with lots of security fixes:
  http://googlechromereleases.blogspot.com/2013/07/stable-channel-
  update.html

  Here are the CVEs:

  CVE-2013-2853: Man-in-the-middle attack against HTTP in SSL.
  CVE-2013-2867: Block pop-unders in various scenarios. 
  CVE-2013-2868: Incorrect sync of NPAPI extension component. 
  CVE-2013-2869: Out-of-bounds read in JPEG2000 handling. 
  CVE-2013-2870: Use-after-free with network sockets. 
  CVE-2013-2871: Use-after-free in input handling.
  CVE-2013-2872: Possible lack of entropy in renderers.
  CVE-2013-2873: Use-after-free in resource loading.
  CVE-2013-2874: Screen data leak with GL textures.
  CVE-2013-2875: Out-of-bounds-read in SVG.
  CVE-2013-2876: Extensions permissions confusion with interstitials.
  CVE-2013-2877: Out-of-bounds read in XML parsing.
  CVE-2013-2878: Out-of-bounds read in text handling.
  CVE-2013-2879: Confusion setting up sign-in and sync.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1199644/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to