[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 3926-1] chromium-browser security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3926-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
August 04, 2017                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
CVE ID         : CVE-2017-5087 CVE-2017-5088 CVE-2017-5089 CVE-2017-5091
                 CVE-2017-5092 CVE-2017-5093 CVE-2017-5094 CVE-2017-5095
                 CVE-2017-5097 CVE-2017-5098 CVE-2017-5099 CVE-2017-5100
                 CVE-2017-5101 CVE-2017-5102 CVE-2017-5103 CVE-2017-5104
                 CVE-2017-5105 CVE-2017-5106 CVE-2017-5107 CVE-2017-5108
                 CVE-2017-5109 CVE-2017-5110 CVE-2017-7000

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2017-5087

    Ned Williamson discovered a way to escape the sandbox.

CVE-2017-5088

    Xiling Gong discovered an out-of-bounds read issue in the v8 javascript
    library.

CVE-2017-5089

    Michal Bentkowski discovered a spoofing issue.

CVE-2017-5091

    Ned Williamson discovered a use-after-free issue in IndexedDB.

CVE-2017-5092

    Yu Zhou discovered a use-after-free issue in PPAPI.

CVE-2017-5093

    Luan Herrera discovered a user interface spoofing issue.

CVE-2017-5094

    A type confusion issue was discovered in extensions.

CVE-2017-5095

    An out-of-bounds write issue was discovered in the pdfium library.

CVE-2017-5097

    An out-of-bounds read issue was discovered in the skia library.

CVE-2017-5098

    Jihoon Kim discover a use-after-free issue in the v8 javascript library.

CVE-2017-5099

    Yuan Deng discovered an out-of-bounds write issue in PPAPI.

CVE-2017-5100

    A use-after-free issue was discovered in Chrome Apps.

CVE-2017-5101

    Luan Herrera discovered a URL spoofing issue.

CVE-2017-5102

    An uninitialized variable was discovered in the skia library.

CVE-2017-5103

    Another uninitialized variable was discovered in the skia library.

CVE-2017-5104

    Khalil Zhani discovered a user interface spoofing issue.

CVE-2017-5105

    Rayyan Bijoora discovered a URL spoofing issue.

CVE-2017-5106

    Jack Zac discovered a URL spoofing issue.

CVE-2017-5107

    David Kohlbrenner discovered an information leak in SVG file handling.

CVE-2017-5108

    Guang Gong discovered a type confusion issue in the pdfium library.

CVE-2017-5109

    Jose Maria Acuna Morgado discovered a user interface spoofing issue.

CVE-2017-5110

    xisigr discovered a way to spoof the payments dialog.

CVE-2017-7000

    Chaitin Security Research Lab discovered an information disclosure
    issue in the sqlite library.

For the stable distribution (stretch), these problems have been fixed in
version 60.0.3112.78-1~deb9u1.

For the unstable distribution (sid), these problems have been fixed in
version 60.0.3112.78-1 or earlier versions.

We recommend that you upgrade your chromium-browser packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=eGg4
-----END PGP SIGNATURE-----


Reply to: