[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1a6qXl-00071m-QG@alpha.psidef.org>
Date: Wed, 09 Dec 2015 21:01:17 -0500
From: Michael Gilbert <mgilbert@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3415-1] chromium-browser security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3415-1 security@...ian.org
https://www.debian.org/security/ Michael Gilbert
December 09, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : chromium-browser
CVE ID : CVE-2015-1302 CVE-2015-6764 CVE-2015-6765 CVE-2015-6766
CVE-2015-6767 CVE-2015-6768 CVE-2015-6769 CVE-2015-6770
CVE-2015-6771 CVE-2015-6772 CVE-2015-6773 CVE-2015-6774
CVE-2015-6775 CVE-2015-6776 CVE-2015-6777 CVE-2015-6778
CVE-2015-6779 CVE-2015-6780 CVE-2015-6781 CVE-2015-6782
CVE-2015-6784 CVE-2015-6785 CVE-2015-6786
Several vulnerabilities have been discovered in the chromium web browser.
CVE-2015-1302
Rub Wu discovered an information leak in the pdfium library.
CVE-2015-6764
Guang Gong discovered an out-of-bounds read issue in the v8
javascript library.
CVE-2015-6765
A use-after-free issue was discovered in AppCache.
CVE-2015-6766
A use-after-free issue was discovered in AppCache.
CVE-2015-6767
A use-after-free issue was discovered in AppCache.
CVE-2015-6768
Mariusz Mlynski discovered a way to bypass the Same Origin
Policy.
CVE-2015-6769
Mariusz Mlynski discovered a way to bypass the Same Origin
Policy.
CVE-2015-6770
Mariusz Mlynski discovered a way to bypass the Same Origin
Policy.
CVE-2015-6771
An out-of-bounds read issue was discovered in the v8
javascript library.
CVE-2015-6772
Mariusz Mlynski discovered a way to bypass the Same Origin
Policy.
CVE-2015-6773
cloudfuzzer discovered an out-of-bounds read issue in the
skia library.
CVE-2015-6774
A use-after-free issue was found in extensions binding.
CVE-2015-6775
Atte Kettunen discovered a type confusion issue in the pdfium
library.
CVE-2015-6776
Hanno Böck dicovered and out-of-bounds access issue in the
openjpeg library, which is used by pdfium.
CVE-2015-6777
Long Liu found a use-after-free issue.
CVE-2015-6778
Karl Skomski found an out-of-bounds read issue in the pdfium
library.
CVE-2015-6779
Til Jasper Ullrich discovered that the pdfium library does
not sanitize "chrome:" URLs.
CVE-2015-6780
Khalil Zhani discovered a use-after-free issue.
CVE-2015-6781
miaubiz discovered an integer overflow issue in the sfntly
library.
CVE-2015-6782
Luan Herrera discovered a URL spoofing issue.
CVE-2015-6784
Inti De Ceukelaire discovered a way to inject HTML into
serialized web pages.
CVE-2015-6785
Michael Ficarra discovered a way to bypass the Content
Security Policy.
CVE-2015-6786
Michael Ficarra discovered another way to bypass the Content
Security Policy.
For the stable distribution (jessie), these problems have been fixed in
version 47.0.2526.73-1~deb8u1.
For the testing distribution (stretch), these problems will be fixed soon.
For the unstable distribution (sid), these problems have been fixed in
version 47.0.2526.73-1.
We recommend that you upgrade your chromium-browser packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=
=NV1Y
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists