-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.0750
                     chromium-browser security update
                                30 May 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium-browser
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Cross-site Scripting     -- Remote with User Interaction
                   Denial of Service        -- Remote with User Interaction
                   Access Confidential Data -- Unknown/Unspecified         
                   Reduced Security         -- Unknown/Unspecified         
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-2849 CVE-2013-2848 CVE-2013-2847
                   CVE-2013-2846 CVE-2013-2845 CVE-2013-2844
                   CVE-2013-2843 CVE-2013-2842 CVE-2013-2841
                   CVE-2013-2840 CVE-2013-2839 CVE-2013-2838
                   CVE-2013-2837  

Reference:         ASB-2013.0066

Original Bulletin: 
   http://www.debian.org/security/2013/dsa-2695

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2695-1                   security@debian.org
http://www.debian.org/security/                           Michael Gilbert
May 29, 2013                           http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : chromium-browser
Vulnerability  : several issues
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2013-2837 CVE-2013-2838 CVE-2013-2839 CVE-2013-2840
                 CVE-2013-2841 CVE-2013-2842 CVE-2013-2843 CVE-2013-2844
                 CVE-2013-2845 CVE-2013-2846 CVE-2013-2847 CVE-2013-2848
                 CVE-2013-2849

Several vulnerabilities have been discovered in the chromium web browser.
Multiple use-after-free, out-of-bounds read, memory safety, and
cross-site scripting issues were discovered and corrected.

CVE-2013-2837

    Use-after-free vulnerability in the SVG implementation allows remote
    attackers to cause a denial of service or possibly have unspecified
    other impact via unknown vectors.

CVE-2013-2838

    Google V8, as used in Chromium before 27.0.1453.93, allows
    remote attackers to cause a denial of service (out-of-bounds read)
    via unspecified vectors.

CVE-2013-2839

    Chromium before 27.0.1453.93 does not properly perform a cast
    of an unspecified variable during handling of clipboard data, which
    allows remote attackers to cause a denial of service or possibly
    have other impact via unknown vectors.

CVE-2013-2840

    Use-after-free vulnerability in the media loader in Chromium
    before 27.0.1453.93 allows remote attackers to cause a denial of
    service or possibly have unspecified other impact via unknown
    vectors, a different vulnerability than CVE-2013-2846.

CVE-2013-2841

    Use-after-free vulnerability in Chromium before 27.0.1453.93
    allows remote attackers to cause a denial of service or possibly
    have unspecified other impact via vectors related to the handling of
    Pepper resources.

CVE-2013-2842

    Use-after-free vulnerability in Chromium before 27.0.1453.93
    allows remote attackers to cause a denial of service or possibly
    have unspecified other impact via vectors related to the handling of
    widgets.

CVE-2013-2843

    Use-after-free vulnerability in Chromium before 27.0.1453.93
    allows remote attackers to cause a denial of service or possibly
    have unspecified other impact via vectors related to the handling of
    speech data.

CVE-2013-2844

    Use-after-free vulnerability in the Cascading Style Sheets (CSS)
    implementation in Chromium before 27.0.1453.93 allows remote
    attackers to cause a denial of service or possibly have unspecified
    other impact via vectors related to style resolution.

CVE-2013-2845

    The Web Audio implementation in Google Chrome before 27.0.1453.93
    allows remote attackers to cause a denial of service (memory
    corruption) or possibly have unspecified other impact via unknown
    vectors.

CVE-2013-2846

    Use-after-free vulnerability in the media loader in Google Chrome
    before 27.0.1453.93 allows remote attackers to cause a denial of
    service or possibly have unspecified other impact via unknown
    vectors, a different vulnerability than CVE-2013-2840.

CVE-2013-2847

    Race condition in the workers implementation in Google Chrome before
    27.0.1453.93 allows remote attackers to cause a denial of service
    (use-after-free and application crash) or possibly have unspecified
    other impact via unknown vectors.

CVE-2013-2848

    The XSS Auditor in Google Chrome before 27.0.1453.93 might allow
    remote attackers to obtain sensitive information via unspecified
    vectors.

CVE-2013-2849

    Multiple cross-site scripting (XSS) vulnerabilities in Google Chrome
    before 27.0.1453.93 allow user-assisted remote attackers to inject
    arbitrary web script or HTML via vectors involving a (1)
    drag-and-drop or (2) copy-and-paste operation.



For the oldstable distribution (squeeze), the security support window
for chromium has ended.  Users of chromium on oldstable are very highly
encouraged to upgrade to the current stable Debian release (wheezy).
Chromium security support for wheezy will last until the next stable
release (jessie), which is expected to happen sometime in 2015.

For the stable distribution (wheezy), these problems have been fixed in
version 27.0.1453.93-1~deb7u1.

For the testing distribution (jessie), these problems will be fixed soon.

For the unstable distribution (sid), these problems have been fixed in
version 27.0.1453.93-1.

We recommend that you upgrade your chromium-browser packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlGmD3oACgkQNxpp46476apeGACfaB/wc8U8a0fzYtlgsjM3RCKi
+OAAnjXaWyZ6iCvfBw0zUI8BcsR+4Lcr
=BCRy
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=pbz3
-----END PGP SIGNATURE-----