Upstream has released version 33.0.1750.146 on March 3: http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html This fixes a handful of new security issues. This is the current version in the stable channel: http://googlechromereleases.blogspot.com/search/label/Stable%20updates Reproducible: Steps to Reproduce:
Whiteboard: (none) => MGA3TOO
Updated packages uploaded for Mageia 3, Mageia 4, and Cauldron. Note to QA: there are both core and tainted builds for this package. Advisory: ======================== Updated chromium-browser-stable packages fix security vulnerabilities: Use-after-free in svg images (CVE-2013-6663). Use-after-free in speech recognition (CVE-2013-6664). Heap buffer overflow in software rendering (CVE-2013-6665). Chrome allows requests in flash header request (CVE-2013-6666). Various fixes from internal audits, fuzzing and other initiatives (CVE-2013-6667). Multiple vulnerabilities in V8 fixed in version 3.24.35.10 (CVE-2013-6668). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6663 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6664 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6665 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6666 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6667 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6668 http://googlechromereleases.blogspot.com/2014/03/stable-channel-update.html ======================== Updated packages in core/updates_testing: ======================== chromium-browser-stable-33.0.1750.146-1.mga3 chromium-browser-33.0.1750.146-1.mga3 chromium-browser-stable-33.0.1750.146-1.mga4 chromium-browser-33.0.1750.146-1.mga4 Updated packages in tainted/updates_testing: ======================== chromium-browser-stable-33.0.1750.146-1.mga3 chromium-browser-33.0.1750.146-1.mga3 chromium-browser-stable-33.0.1750.146-1.mga4 chromium-browser-33.0.1750.146-1.mga4 from SRPMS: chromium-browser-stable-33.0.1750.146-1.mga3.src.rpm chromium-browser-stable-33.0.1750.146-1.mga4.src.rpm
Assignee: bugsquad => qa-bugs
Advisory added to svn. Will test as soon as my local mirror syncs the update.
CC: (none) => davidwhodginsWhiteboard: MGA3TOO => MGA3TOO advisory
Advisory updated to include tainted srpms. Testing complete on Mageia 3 and 4 i586 and x86_64 non-tainted. Testing complete on Mageia 3 and 4 i586 tainted.
tested tainted builds mageia 3 and 4 i586 and x86_64. All OK. validating. Could someone from the sysadmin team please push to core and tainted updates? Thanks!
Keywords: (none) => validated_updateWhiteboard: MGA3TOO advisory => MGA3TOO advisory mga3-32-ok mga3-64-ok mga4-64-ok mga4-32-okCC: (none) => wrw105, sysadmin-bugs
Update pushed: http://advisories.mageia.org/MGASA-2014-0121.html
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED