- Home
- CVEs with nessus.description==- Update to Chromium 31.0.1650.63 Stable channel update :
- Security fixes :
- CVE-2013-6634: Session fixation in sync related to 302 redirects
- CVE-2013-6635: Use-after-free in editing
- CVE-2013-6636: Address bar spoofing related to modal dialogs
- CVE-2013-6637: Various fixes from internal audits, fuzzing and other initiatives.
- CVE-2013-6638: Buffer overflow in v8
- CVE-2013-6639: Out of bounds write in v8.
- CVE-2013-6640: Out of bounds read in v8
- and 12 other security fixes.
- Remove the build flags to build according to the Chrome ffmpeg branding and the proprietary codecs. (bnc#847971)
- Update to Chromium 31.0.1650.57 Stable channel update :
- Security Fixes :
- CVE-2013-6632: Multiple memory corruption issues.
- Update to Chromium 31.0.1650.48 Stable Channel update :
- Security fixes :
- CVE-2013-6621: Use after free related to speech input elements..
- CVE-2013-6622: Use after free related to media elements.
- CVE-2013-6623: Out of bounds read in SVG.
- CVE-2013-6624: Use after free related to “id” attribute strings.
- CVE-2013-6625: Use after free in DOM ranges.
- CVE-2013-6626: Address bar spoofing related to interstitial warnings.
- CVE-2013-6627: Out of bounds read in HTTP parsing.
- CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation.
- CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives.
- CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo.
- CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo.
- CVE-2013-6631: Use after free in libjingle.
- Added patch chromium-fix-chromedriver-build.diff to fix the chromedriver build
- Enable ARM build for Chromium.
- Added patches chromium-arm-webrtc-fix.patch, chromium-fix-arm-icu.patch and chromium-fix-arm-sysroot.patch to resolve ARM specific build issues
- Update to Chromium 30.0.1599.114 Stable Channel update:
fix build for 32bit systems
- Drop patch chromium-fix-chromedriver-build.diff. This is now fixed upstream
- For openSUSE versions lower than 13.1, build against the in-tree libicu
- Update to Chromium 30.0.1599.101
- Security Fixes :
+ CVE-2013-2925: Use after free in XHR
+ CVE-2013-2926: Use after free in editing
+ CVE-2013-2927: Use after free in forms.
+ CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives.
- Update to Chromium 30.0.1599.66
- Easier searching by image
- A number of new apps/extension APIs
- Lots of under the hood changes for stability and performance
- Security fixes :
+ CVE-2013-2906: Races in Web Audio
+ CVE-2013-2907: Out of bounds read in Window.prototype object
+ CVE-2013-2908: Address bar spoofing related to the “204 No Content” status code
+ CVE-2013-2909: Use after free in inline-block rendering
+ CVE-2013-2910: Use-after-free in Web Audio
+ CVE-2013-2911: Use-after-free in XSLT
+ CVE-2013-2912: Use-after-free in PPAPI
+ CVE-2013-2913: Use-after-free in XML document parsing
+ CVE-2013-2914: Use after free in the Windows color chooser dialog
+ CVE-2013-2915: Address bar spoofing via a malformed scheme
+ CVE-2013-2916: Address bar spoofing related to the “204 No Content” status code
+ CVE-2013-2917: Out of bounds read in Web Audio
+ CVE-2013-2918: Use-after-free in DOM
+ CVE-2013-2919: Memory corruption in V8
+ CVE-2013-2920: Out of bounds read in URL parsing
+ CVE-2013-2921: Use-after-free in resource loader
+ CVE-2013-2922: Use-after-free in template element
+ CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives
+ CVE-2013-2924: Use-after-free in ICU. Upstream bug
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top