Bug 13412 - chromium-browser-stable new security issues fixed in 34.0.1847.137
Summary: chromium-browser-stable new security issues fixed in 34.0.1847.137
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/599434/
Whiteboard: MGA3TOO advisory mga4-64-ok mga4-32-o...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2014-05-19 21:20 CEST by David Walser
Modified: 2014-05-22 19:30 CEST (History)
3 users (show)

See Also:
Source RPM: chromium-browser-stable-34.0.1847.132-2.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2014-05-19 21:20:08 CEST
Debian has issued an advisory on May 17:
https://www.debian.org/security/2014/dsa-2930

These issues are fixed in 34.0.1847.137 upstream:
http://googlechromereleases.blogspot.com/2014/05/stable-channel-update.html

This is the current version in the stable channel:
http://googlechromereleases.blogspot.com/search/label/Stable%20updates

(the blog post must not have been properly tagged, since it doesn't appear there)

Reproducible: 

Steps to Reproduce:
David Walser 2014-05-19 21:20:13 CEST

Whiteboard: (none) => MGA4TOO, MGA3TOO

Comment 1 David Walser 2014-05-20 00:46:38 CEST
Note to self:  enable Aura in Chromium 35 (-Duse_aura=1)
Comment 2 David Walser 2014-05-20 00:50:01 CEST
Updated packages uploaded for Mageia 3, Mageia 4, and Cauldron.

Note to QA: there are both core and tainted builds for this package.

The tainted builds are still building, so they won't be available for a couple hours.  The core builds are already uploaded.

Advisory:
========================

Updated chromium-browser-stable packages fix security vulnerabilities:

Collin Payne discovered a use-after-free issue in chromium's WebSockets
implementation (CVE-2014-1740).

John Butler discovered multiple integer overflow issues in the Blink/Webkit
document object model implementation (CVE-2014-1741).

cloudfuzzer discovered a use-after-free issue in the Blink/Webkit text
editing feature (CVE-2014-1742).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1741
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1742
http://googlechromereleases.blogspot.com/2014/05/stable-channel-update.html
https://www.debian.org/security/2014/dsa-2930
========================

Updated packages in core/updates_testing:
========================
chromium-browser-stable-34.0.1847.137-1.mga3
chromium-browser-34.0.1847.137-1.mga3
chromium-browser-stable-34.0.1847.137-1.mga4
chromium-browser-34.0.1847.137-1.mga4

Updated packages in tainted/updates_testing:
========================
chromium-browser-stable-34.0.1847.137-1.mga3
chromium-browser-34.0.1847.137-1.mga3
chromium-browser-stable-34.0.1847.137-1.mga4
chromium-browser-34.0.1847.137-1.mga4

from SRPMS:
chromium-browser-stable-34.0.1847.137-1.mga3.src.rpm
chromium-browser-stable-34.0.1847.137-1.mga4.src.rpm

Version: Cauldron => 4
Assignee: bugsquad => qa-bugs
Whiteboard: MGA4TOO, MGA3TOO => MGA3TOO

Comment 3 Bill Wilkinson 2014-05-20 20:59:35 CEST
tested the usual usability on mga4-64:

general browsing
sunspider
acid3
javatester
youtube for flash

tainted build also https://archive.org/details/testmp3testfile for mp3

all OK

CC: (none) => wrw105
Whiteboard: MGA3TOO => MGA3TOO mga4-64-ok

Comment 4 Bill Wilkinson 2014-05-21 14:30:04 CEST
Tested mga4-32 as above, all OK.

Will get to mga3 this evening (US EAst Coast) if nobody beats me to it.

Whiteboard: MGA3TOO mga4-64-ok => MGA3TOO mga4-64-ok mga4-32-ok

Comment 5 Bill Wilkinson 2014-05-22 02:11:50 CEST
mga3-32 ok

Whiteboard: MGA3TOO mga4-64-ok mga4-32-ok => MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok

Comment 6 claire robinson 2014-05-22 09:56:51 CEST
Testing complete mga3 64 in vbox

Tested tainted with a local mp3 file (ctrl-o to open the file browser dialog)

Whiteboard: MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok => MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok

Comment 7 claire robinson 2014-05-22 10:04:33 CEST
Advisory uploaded (including secret tainted srpms :P)

Validating. Could sysadmin please push to 3 & 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok => MGA3TOO advisory mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok
CC: (none) => sysadmin-bugs

Comment 8 Thomas Backlund 2014-05-22 19:30:23 CEST
Update pushed:
http://advisories.mageia.org/MGASA-2014-0232.html

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.