Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.
1) A validation error when performing message deserialisation can be exploited to cause a crash or potentially corrupt memory.
This vulnerability affects 64-bit builds for Linux only.
2) An unspecified error when parsing Cascading Style Sheets (CSS) can be exploited to trigger an out-of-bounds read.
3) An unspecified error within cursor handling can be exploited to reference stale pointers.
Solution: Update to version 8.0.552.224.
Provided and/or discovered by: The vendor credits:
1) Lei Zhang, Chromium development community
2) Chris Rohlf
3) Slawomir Blazek and Sergey Glazunov
Original Advisory: http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org