Upstream has released version 30.0.1599.66 on October 1: http://googlechromereleases.blogspot.ro/2013/10/stable-channel-update.html This fixes a handful of new security issues. This is the current version in the stable channel: http://googlechromereleases.blogspot.com/search/label/Stable%20updates Reproducible: Steps to Reproduce:
Whiteboard: (none) => MGA3TOO, MGA2TOO
Updated packages uploaded for Mageia 2, Mageia 3, and Cauldron. Advisory is not available yet. I don't know what it means or if it matters, but there was a file called chrome-remote-desktop.pak in the previous packages that is no longer available in this update. Packages uploaded: ----------------- chromium-browser-stable-30.0.1599.66-1.mga2 chromium-browser-30.0.1599.66-1.mga2 chromium-browser-stable-30.0.1599.66-1.mga3 chromium-browser-30.0.1599.66-1.mga3 from SRPMS: chromium-browser-stable-30.0.1599.66-1.mga2.src.rpm chromium-browser-stable-30.0.1599.66-1.mga3.src.rpm
Version: Cauldron => 3Assignee: dmorganec => qa-bugsWhiteboard: MGA3TOO, MGA2TOO => MGA2TOO
That sounds like the browser addon.. https://chrome.google.com/webstore/detail/chrome-remote-desktop/gbchcmhmhahfdphkhkmpfmihenigjmpp?hl=en
It seems apps update automatically and silently now so it is probably nothing to worry about http://chrome.blogspot.co.uk/2013/09/a-new-breed-of-chrome-apps.html
Testing complete mga3 32 & 64 Usual browser tests, java, flash, addons, https, general browsing stuff.
Whiteboard: MGA2TOO => MGA2TOO mga3-32-ok mga3-64-ok
Testing complete mga2 32
Whiteboard: MGA2TOO mga3-32-ok mga3-64-ok => MGA2TOO mga3-32-ok mga3-64-ok mga2-32-ok
Testing complete mga2 64 Ready for validating. Advisory 11361.adv uploaded. It will need to be updated with the description and any references before passing to sysadmins please.
Whiteboard: MGA2TOO mga3-32-ok mga3-64-ok mga2-32-ok => MGA2TOO mga3-32-ok mga3-64-ok mga2-32-ok mga2-64-ok
Still need an advisory for this one please.
Debian still hasn't updated theirs, and the upstream blog post only lists some of the CVEs fixed, without any details. Do we want to push this and do the advisory later or just wait?
We usually treat browser updates as high priority, probably best to push with a temporary advisory and update it later.
Added the advisory as.. + This updates chromium-browser to the latest stable version, fixing + multiple security vulnerabilities. + + This advisory will be updated later when full details become available. Validating. Could sysadmin please push to updates Thanks!
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
Claire, please add a reference to the advisory: http://googlechromereleases.blogspot.ro/2013/10/stable-channel-update.html
Done.
OpenSuSE has issued an advisory for this on October 16: http://lists.opensuse.org/opensuse-updates/2013-10/msg00027.html Their advisory doesn't have any more details than the upstream one does. There are supposed to be 50 security fixes, but only 19 CVEs are listed: - Security fixes: - CVE-2013-2906: Races in Web Audio - CVE-2013-2907: Out of bounds read in Window.prototype object - CVE-2013-2908: Address bar spoofing related to the "204 No Content" status code - CVE-2013-2909: Use after free in inline-block rendering - CVE-2013-2910: Use-after-free in Web Audio - CVE-2013-2911: Use-after-free in XSLT - CVE-2013-2912: Use-after-free in PPAPI - CVE-2013-2913: Use-after-free in XML document parsing - CVE-2013-2914: Use after free in the Windows color chooser dialog - CVE-2013-2915: Address bar spoofing via a malformed scheme - CVE-2013-2916: Address bar spoofing related to the "204 No Content" status code - CVE-2013-2917: Out of bounds read in Web Audio - CVE-2013-2918: Use-after-free in DOM - CVE-2013-2919: Memory corruption in V8 - CVE-2013-2920: Out of bounds read in URL parsing - CVE-2013-2921: Use-after-free in resource loader - CVE-2013-2922: Use-after-free in template element - CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives - CVE-2013-2924: Use-after-free in ICU. Upstream bug
URL: (none) => http://lwn.net/Vulnerabilities/570682/
Update pushed: http://advisories.mageia.org/MGASA-2013-0306.html
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED
Re-opening. There is also a tainted SRPM for this on mga3 which wasn't listed/added/pushed. Added chromium-browser-stable-30.0.1599.66-1.mga3.tainted to advisory. Could sysadmin please push it to updates. Thanks!
Status: RESOLVED => REOPENEDResolution: FIXED => (none)
hmm actually, I'm not seeing it in the repo. Was tainted built for this?
Removed tainted srpm from the advisory again, for now, as it seems to be missing from the mirrors so I'm unable to test it. Checking svnweb, there was a change to this for 30 so it looks to be an issue and could need a rebuild. It appears it is actually intended to be present though, although not listed with the srpms.
I'm guessing it was forgotten at the time. I've just pushed it to the build system for Mageia 3 tainted/updates_testing.
Thanks David, removing mga3 whiteboard for now. Note to testers: When it lands, this is just the tainted packages which were missed previously. Chromium-browser-stable & chromium-browser from tainted updates testing. One should require the other, I don't recall which one is which. It should be able to play mp3's
Keywords: validated_update => (none)Whiteboard: MGA2TOO mga3-32-ok mga3-64-ok mga2-32-ok mga2-64-ok => MGA2TOO mga2-32-ok mga2-64-ok
Advisory updated and cve list from comment 13 added.
See here for previous tainted testing: https://bugs.mageia.org/show_bug.cgi?id=10804#c7
Testing complete. Re-Validating. Could sysadmin please push the missing chromium-browser-stable from 3 tainted updates testing to updates. Advisory was updated in comment 20. Thanks!
Keywords: (none) => validated_updateWhiteboard: MGA2TOO mga2-32-ok mga2-64-ok => MGA2TOO mga2-32-ok mga2-64-ok mga3-32-ok mga3-64-ok
Tainted build pushed.
Status: REOPENED => RESOLVEDResolution: (none) => FIXED
The Debian advisory is finally available. It lists a few more CVEs (2925 through 2928): http://www.debian.org/security/2013/dsa-2785
(In reply to David Walser from comment #24) > The Debian advisory is finally available. It lists a few more CVEs (2925 > through 2928): > http://www.debian.org/security/2013/dsa-2785 Ahh, this would be because there's a newer version of Chromium fixing these: http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_15.html And an even newer version fixing a regression: http://googlechromereleases.blogspot.com/2013/10/stable-channel-update_22.html Time for another update :o(