Summary: | <www-client/chromium-31.0.1650.57 : Multiple Memory Corruption Vulnerabilities (CVE-2013-{6632,6802}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | chromium |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://googlechromereleases.blogspot.it/2013/11/stable-channel-update_14.html | ||
Whiteboard: | A2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() I am still waiting for a source tarball to be posted upstream. Ok, I rolled my own tarball. Please stabilize on amd64 and x86. =www-client/chromium-31.0.1650.57 amd64 stable x86 stable Security please file the request. CVE-2013-6802 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6802): Google Chrome before 31.0.1650.57 allows remote attackers to bypass intended sandbox restrictions by leveraging access to a renderer process, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013, a different vulnerability than CVE-2013-6632. CVE-2013-6632 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6632): Integer overflow in Google Chrome before 31.0.1650.57 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013. Added to existing GLSA Draft This issue was resolved and addressed in GLSA 201403-01 at http://security.gentoo.org/glsa/glsa-201403-01.xml by GLSA coordinator Mikle Kolyada (Zlogene). |