Debian has issued an advisory on May 17: https://www.debian.org/security/2014/dsa-2930 These issues are fixed in 34.0.1847.137 upstream: http://googlechromereleases.blogspot.com/2014/05/stable-channel-update.html This is the current version in the stable channel: http://googlechromereleases.blogspot.com/search/label/Stable%20updates (the blog post must not have been properly tagged, since it doesn't appear there) Reproducible: Steps to Reproduce:
Whiteboard: (none) => MGA4TOO, MGA3TOO
Note to self: enable Aura in Chromium 35 (-Duse_aura=1)
Updated packages uploaded for Mageia 3, Mageia 4, and Cauldron. Note to QA: there are both core and tainted builds for this package. The tainted builds are still building, so they won't be available for a couple hours. The core builds are already uploaded. Advisory: ======================== Updated chromium-browser-stable packages fix security vulnerabilities: Collin Payne discovered a use-after-free issue in chromium's WebSockets implementation (CVE-2014-1740). John Butler discovered multiple integer overflow issues in the Blink/Webkit document object model implementation (CVE-2014-1741). cloudfuzzer discovered a use-after-free issue in the Blink/Webkit text editing feature (CVE-2014-1742). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1741 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1742 http://googlechromereleases.blogspot.com/2014/05/stable-channel-update.html https://www.debian.org/security/2014/dsa-2930 ======================== Updated packages in core/updates_testing: ======================== chromium-browser-stable-34.0.1847.137-1.mga3 chromium-browser-34.0.1847.137-1.mga3 chromium-browser-stable-34.0.1847.137-1.mga4 chromium-browser-34.0.1847.137-1.mga4 Updated packages in tainted/updates_testing: ======================== chromium-browser-stable-34.0.1847.137-1.mga3 chromium-browser-34.0.1847.137-1.mga3 chromium-browser-stable-34.0.1847.137-1.mga4 chromium-browser-34.0.1847.137-1.mga4 from SRPMS: chromium-browser-stable-34.0.1847.137-1.mga3.src.rpm chromium-browser-stable-34.0.1847.137-1.mga4.src.rpm
Version: Cauldron => 4Assignee: bugsquad => qa-bugsWhiteboard: MGA4TOO, MGA3TOO => MGA3TOO
tested the usual usability on mga4-64: general browsing sunspider acid3 javatester youtube for flash tainted build also https://archive.org/details/testmp3testfile for mp3 all OK
CC: (none) => wrw105Whiteboard: MGA3TOO => MGA3TOO mga4-64-ok
Tested mga4-32 as above, all OK. Will get to mga3 this evening (US EAst Coast) if nobody beats me to it.
Whiteboard: MGA3TOO mga4-64-ok => MGA3TOO mga4-64-ok mga4-32-ok
mga3-32 ok
Whiteboard: MGA3TOO mga4-64-ok mga4-32-ok => MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok
Testing complete mga3 64 in vbox Tested tainted with a local mp3 file (ctrl-o to open the file browser dialog)
Whiteboard: MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok => MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok
Advisory uploaded (including secret tainted srpms :P) Validating. Could sysadmin please push to 3 & 4 updates Thanks
Keywords: (none) => validated_updateWhiteboard: MGA3TOO mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-ok => MGA3TOO advisory mga4-64-ok mga4-32-ok mga3-32-ok mga3-64-okCC: (none) => sysadmin-bugs
Update pushed: http://advisories.mageia.org/MGASA-2014-0232.html
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED