{"id":"MGASA-2013-0324","summary":"Updated chromium-browser-stable packages fix multiple vulnerabilities","details":"Updated chromium-browser-stable packages fix security vulnerabilities:\n\nVarious fixes from internal audits, fuzzing and other initiatives\n(CVE-2013-2931).\n\nUse after free related to speech input elements (CVE-2013-6621).\n\nUse after free related to media elements (CVE-2013-6622).\n\nOut of bounds read in SVG (CVE-2013-6623).\n\nUse after free related to 'id' attribute strings (CVE-2013-6624).\n\nUse after free in DOM ranges (CVE-2013-6625).\n\nAddress bar spoofing related to interstitial warnings (CVE-2013-6626).\n\nOut of bounds read in HTTP parsing (CVE-2013-6627).\n\nIssue with certificates not being checked during TLS renegotiation\n(CVE-2013-6628).\n\nlibjpeg 6b and libjpeg-turbo will use uninitialized memory when decoding\nimages with missing SOS data for the luminance component (Y) in presence of\nvalid chroma data (Cr, Cb) (CVE-2013-6629).\n\nlibjpeg-turbo will use uninitialized memory when handling Huffman tables\n(CVE-2013-6630).\n\nUse after free in libjingle (CVE-2013-6631).\n","modified":"2026-04-16T01:49:06.256252873Z","published":"2013-11-13T19:09:45Z","upstream":["CVE-2013-2931","CVE-2013-6621","CVE-2013-6622","CVE-2013-6623","CVE-2013-6624","CVE-2013-6625","CVE-2013-6626","CVE-2013-6627","CVE-2013-6628","CVE-2013-6629","CVE-2013-6630","CVE-2013-6631"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0324.html"},{"type":"WEB","url":"http://permalink.gmane.org/gmane.comp.security.full-disclosure/90919"},{"type":"WEB","url":"http://googlechromereleases.blogspot.com/2013/11/stable-channel-update.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=11657"}],"affected":[{"package":{"name":"chromium-browser-stable","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/chromium-browser-stable?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"31.0.1650.48-1.mga2"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0324.json"}},{"package":{"name":"chromium-browser-stable","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/chromium-browser-stable?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"31.0.1650.48-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0324.json"}},{"package":{"name":"chromium-browser-stable","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/chromium-browser-stable?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"31.0.1650.48-1.mga3.tainted"}]}],"ecosystem_specific":{"section":"tainted"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0324.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}