{"id":"MGASA-2013-0306","summary":"Updated chromium-browser-stable packages fix security vulnerabilities","details":"This updates chromium-browser to the latest stable version, fixing\nmultiple security vulnerabilities.\n\nSecurity fixes:\nCVE-2013-2906: Races in Web Audio\nCVE-2013-2907: Out of bounds read in Window.prototype object\nCVE-2013-2908: Address bar spoofing related to the \"204 No Content\"\n               status code\nCVE-2013-2909: Use after free in inline-block rendering\nCVE-2013-2910: Use-after-free in Web Audio\nCVE-2013-2911: Use-after-free in XSLT\nCVE-2013-2912: Use-after-free in PPAPI\nCVE-2013-2913: Use-after-free in XML document parsing\nCVE-2013-2914: Use after free in the Windows color chooser dialog\nCVE-2013-2915: Address bar spoofing via a malformed scheme\nCVE-2013-2916: Address bar spoofing related to the \"204 No Content\"\n               status code\nCVE-2013-2917: Out of bounds read in Web Audio\nCVE-2013-2918: Use-after-free in DOM\nCVE-2013-2919: Memory corruption in V8\nCVE-2013-2920: Out of bounds read in URL parsing\nCVE-2013-2921: Use-after-free in resource loader\nCVE-2013-2922: Use-after-free in template element\nCVE-2013-2923: Various fixes from internal audits, fuzzing and other\n               initiatives\nCVE-2013-2924: Use-after-free in ICU. Upstream bug\n","modified":"2026-02-01T02:00:03.026303Z","published":"2013-10-17T18:53:27Z","related":["CVE-2013-2906","CVE-2013-2907","CVE-2013-2908","CVE-2013-2909","CVE-2013-2910","CVE-2013-2911","CVE-2013-2912","CVE-2013-2913","CVE-2013-2914","CVE-2013-2915","CVE-2013-2916","CVE-2013-2917","CVE-2013-2918","CVE-2013-2919","CVE-2013-2920","CVE-2013-2921","CVE-2013-2922","CVE-2013-2923","CVE-2013-2924"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0306.html"},{"type":"REPORT","url":"http://googlechromereleases.blogspot.ro/2013/10/stable-channel-update.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=11361"}],"affected":[{"package":{"name":"chromium-browser-stable","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/chromium-browser-stable?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"30.0.1599.66-1.mga2"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0306.json"}},{"package":{"name":"chromium-browser-stable","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/chromium-browser-stable?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"30.0.1599.66-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0306.json"}},{"package":{"name":"chromium-browser-stable","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/chromium-browser-stable?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"30.0.1599.66-1.mga3.tainted"}]}],"ecosystem_specific":{"section":"tainted"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0306.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}