Upstream has released version 50.0.2661.75 on April 13: http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html This fixes several new security issues. This is the current version in the stable channel: http://googlechromereleases.blogspot.com/search/label/Stable%20updates There were also two bugfix releases since our last update: http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_28.html http://googlechromereleases.blogspot.com/2016/04/stable-channel-update.html
URL: (none) => http://lwn.net/Vulnerabilities/683985/
This release does not play video on youtube in my VMs with default settings. The media still play, audio works, but no image is visible (except controls etc.). The problem can be fixed by disabling "Use hardware acceleration when available" in Settings/advanced Settings. On real hardware I expect video to still work.
Status: NEW => ASSIGNEDCC: (none) => cjw
"Linux/Solaris Additions: fixed several issues causing Linux/Solatis guests using software rendering when 3D acceleration is available" from VirtualBox 5.0.18, maybe that will fix your issue.
I don't use virtualbox and it also happens when using a remote X display (with version 51.0.2693.2), this is a bug in chromium. I already had hardware acceleration disabled in my regular account, that's why I didn't notice it earlier with chromium 50 dev builds.
Packages are available for testing: MGA5 SRPM: chromium-browser-stable-50.0.2661.75-1.mga5.src.rpm RPMS: chromium-browser-stable-50.0.2661.75-1.mga5.i586.rpm chromium-browser-50.0.2661.75-1.mga5.i586.rpm chromium-browser-stable-50.0.2661.75-1.mga5.x86_64.rpm chromium-browser-50.0.2661.75-1.mga5.x86_64.rpm Proposed advisory: Chromium-browser-stable 50.0.2661.75 fixes security issues: Cross-site scripting (XSS) vulnerability in the ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the Extensions subsystem in Google Chrome before 50.0.2661.75 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)." (CVE-2016-1652) The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc. (CVE-2016-1653) fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 50.0.2661.75, does not properly implement the sycc420_to_rgb and sycc422_to_rgb functions, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted JPEG 2000 data in a PDF document. (CVE-2016-1651) The media subsystem in Google Chrome before 50.0.2661.75 does not initialize an unspecified data structure, which allows remote attackers to cause a denial of service (invalid read operation) via unknown vectors. (CVE-2016-1654) Google Chrome before 50.0.2661.75 does not properly consider that frame removal may occur during callback execution, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted extension. (CVE-2016-1655) The WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 50.0.2661.75 mishandles focus for certain about:blank pages, which allows remote attackers to spoof the address bar via a crafted URL. (CVE-2016-1657) The Extensions subsystem in Google Chrome before 50.0.2661.75 incorrectly relies on GetOrigin method calls for origin comparisons, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted extension. (CVE-2016-1658) Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. (CVE-2016-1659) References: http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
Assignee: cjw => qa-bugs
Tested mga5-64 General browsing, Jetstream for javascript, acid3, Youtube for video. All OK
CC: (none) => wrw105Whiteboard: (none) => has_procedure mga5-64-ok
Working fine on Mageia 5 i586 as well.
Whiteboard: has_procedure mga5-64-ok => has_procedure MGA5-32-OK MGA5-64-OK
Good work guys, that was quick!
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
Advisory uploaded.
Whiteboard: has_procedure MGA5-32-OK MGA5-64-OK => has_procedure advisory MGA5-32-OK MGA5-64-OK
An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0143.html
Status: ASSIGNED => RESOLVEDResolution: (none) => FIXED