lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CANTw=MPaBP--YZgODyce0vjtNscKLUHqDQKLyhQc4x395fnSWA@mail.gmail.com>
Date: Sun, 18 Nov 2018 02:36:44 -0500
From: Michael Gilbert <mgilbert@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4340-1] chromium-browser security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4340-1                   security@...ian.org
https://www.debian.org/security/                          Michael Gilbert
November 18, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
CVE ID         : CVE-2018-17478

An out-of-bounds bounds memory access issue was discovered in chromium's
v8 javascript library by cloudfuzzer.

This update also fixes two problems introduced by the previous security
upload.  Support for arm64 has been restored and gconf-service is no longer
a package dependency.

For the stable distribution (stretch), this problem has been fixed in
version 70.0.3538.102-1~deb9u1.

We recommend that you upgrade your chromium-browser packages.

For the detailed security status of chromium-browser please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium-browser

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=UwXD
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ