[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1ddjiK-0001mO-20@master.debian.org>
Date: Fri, 04 Aug 2017 21:00:56 +0000
From: Michael Gilbert <mgilbert@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3926-1] chromium-browser security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3926-1 security@...ian.org
https://www.debian.org/security/ Michael Gilbert
August 04, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : chromium-browser
CVE ID : CVE-2017-5087 CVE-2017-5088 CVE-2017-5089 CVE-2017-5091
CVE-2017-5092 CVE-2017-5093 CVE-2017-5094 CVE-2017-5095
CVE-2017-5097 CVE-2017-5098 CVE-2017-5099 CVE-2017-5100
CVE-2017-5101 CVE-2017-5102 CVE-2017-5103 CVE-2017-5104
CVE-2017-5105 CVE-2017-5106 CVE-2017-5107 CVE-2017-5108
CVE-2017-5109 CVE-2017-5110 CVE-2017-7000
Several vulnerabilities have been discovered in the chromium web browser.
CVE-2017-5087
Ned Williamson discovered a way to escape the sandbox.
CVE-2017-5088
Xiling Gong discovered an out-of-bounds read issue in the v8 javascript
library.
CVE-2017-5089
Michal Bentkowski discovered a spoofing issue.
CVE-2017-5091
Ned Williamson discovered a use-after-free issue in IndexedDB.
CVE-2017-5092
Yu Zhou discovered a use-after-free issue in PPAPI.
CVE-2017-5093
Luan Herrera discovered a user interface spoofing issue.
CVE-2017-5094
A type confusion issue was discovered in extensions.
CVE-2017-5095
An out-of-bounds write issue was discovered in the pdfium library.
CVE-2017-5097
An out-of-bounds read issue was discovered in the skia library.
CVE-2017-5098
Jihoon Kim discover a use-after-free issue in the v8 javascript library.
CVE-2017-5099
Yuan Deng discovered an out-of-bounds write issue in PPAPI.
CVE-2017-5100
A use-after-free issue was discovered in Chrome Apps.
CVE-2017-5101
Luan Herrera discovered a URL spoofing issue.
CVE-2017-5102
An uninitialized variable was discovered in the skia library.
CVE-2017-5103
Another uninitialized variable was discovered in the skia library.
CVE-2017-5104
Khalil Zhani discovered a user interface spoofing issue.
CVE-2017-5105
Rayyan Bijoora discovered a URL spoofing issue.
CVE-2017-5106
Jack Zac discovered a URL spoofing issue.
CVE-2017-5107
David Kohlbrenner discovered an information leak in SVG file handling.
CVE-2017-5108
Guang Gong discovered a type confusion issue in the pdfium library.
CVE-2017-5109
Jose Maria Acuna Morgado discovered a user interface spoofing issue.
CVE-2017-5110
xisigr discovered a way to spoof the payments dialog.
CVE-2017-7000
Chaitin Security Research Lab discovered an information disclosure
issue in the sqlite library.
For the stable distribution (stretch), these problems have been fixed in
version 60.0.3112.78-1~deb9u1.
For the unstable distribution (sid), these problems have been fixed in
version 60.0.3112.78-1 or earlier versions.
We recommend that you upgrade your chromium-browser packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlmE3e1fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0RoZg//cZyW1q1xGWs77tpnC2aP2BTG3IB0cMP3zwpWnLmfrSvkf8f2uE5xU7uZ
M9ZXfsOXoex4C9TvWkV8DlLI8oS2kbrmYHqcdc66Qfwn0yZDHtLVKZuphWeNZL4A
ccccGZQCVj6M5b7t1aXny3Fks7ozHUKJLymBMjjMdQ8OSlLnLILKeTV/TVnRRZ7H
2MOs9i4Oh5Ul77Ny0Nc2x9JNKk5a7jMMZ77c9gNnwdT/KRiFS4sCVTtNHSND7D4g
mM6W3UJIl6AbIzMVyAuA8OJ/voB1RNOvgCFFnuavLFq5knEt0efWSz3F7lhPrnMF
N2+Z+fzXqO4yiwtynG1TLvUopRBBUAyrTCU9cu2ENxFd3aRIxEvkjrpYY41In7vN
Oyp8+SPKWANb7PPh0KgAp+RSSq1hbRPGvsebBpSzPv5A4gJTAbse0fpZsLCMKJFu
fOfDDFRupzsPMBNxbVD8UfrJwVWdARtoaOm4q6gJKhnHbUwwkAWYnwtLmoTIxAmI
oQuoOQ5Sf3Sob8i2mM9Qk0KchacfaQBYrMMlTf0Lfq3z1jkK/LS/naX301BJY9H2
k2U7/m5q/asgc8A66lpKKib/KdGRMy0mg8BSupUoaS4Eyn+VrjgDYNsaxN+v3mTq
dKodrbkl0gRhB2OZuO1M08fxsfZiJ3WGY4qZPuFmc3acT6tlCYg=
=eGg4
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists