[SECURITY] [DSA 4906-1] chromium security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4906-1 security@debian.org
https://www.debian.org/security/ Michael Gilbert
April 27, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : chromium
CVE ID : CVE-2021-21201 CVE-2021-21202 CVE-2021-21203 CVE-2021-21204
CVE-2021-21205 CVE-2021-21207 CVE-2021-21208 CVE-2021-21209
CVE-2021-21210 CVE-2021-21211 CVE-2021-21212 CVE-2021-21213
CVE-2021-21214 CVE-2021-21215 CVE-2021-21216 CVE-2021-21217
CVE-2021-21218 CVE-2021-21219 CVE-2021-21221 CVE-2021-21222
CVE-2021-21223 CVE-2021-21224 CVE-2021-21225 CVE-2021-21226
Several vulnerabilities have been discovered in the chromium web browser.
CVE-2021-21201
Gengming Liu and Jianyu Chen discovered a use-after-free issue.
CVE-2021-21202
David Erceg discovered a use-after-free issue in extensions.
CVE-2021-21203
asnine discovered a use-after-free issue in Blink/Webkit.
CVE-2021-21204
Tsai-Simek, Jeanette Ulloa, and Emily Voigtlander discovered a
use-after-free issue in Blink/Webkit.
CVE-2021-21205
Alison Huffman discovered a policy enforcement error.
CVE-2021-21207
koocola and Nan Wang discovered a use-after-free in the indexed database.
CVE-2021-21208
Ahmed Elsobky discovered a data validation error in the QR code scanner.
CVE-2021-21209
Tom Van Goethem discovered an implementation error in the Storage API.
CVE-2021-21210
@bananabr discovered an error in the networking implementation.
CVE-2021-21211
Akash Labade discovered an error in the navigation implementation.
CVE-2021-21212
Hugo Hue and Sze Yui Chau discovered an error in the network configuration
user interface.
CVE-2021-21213
raven discovered a use-after-free issue in the WebMIDI implementation.
CVE-2021-21214
A use-after-free issue was discovered in the networking implementation.
CVE-2021-21215
Abdulrahman Alqabandi discovered an error in the Autofill feature.
CVE-2021-21216
Abdulrahman Alqabandi discovered an error in the Autofill feature.
CVE-2021-21217
Zhou Aiting discovered use of uninitialized memory in the pdfium library.
CVE-2021-21218
Zhou Aiting discovered use of uninitialized memory in the pdfium library.
CVE-2021-21219
Zhou Aiting discovered use of uninitialized memory in the pdfium library.
CVE-2021-21221
Guang Gong discovered insufficient validation of untrusted input.
CVE-2021-21222
Guang Gong discovered a buffer overflow issue in the v8 javascript
library.
CVE-2021-21223
Guang Gong discovered an integer overflow issue.
CVE-2021-21224
Jose Martinez discovered a type error in the v8 javascript library.
CVE-2021-21225
Brendon Tiszka discovered an out-of-bounds memory access issue in the v8
javascript library.
CVE-2021-21226
Brendon Tiszka discovered a use-after-free issue in the networking
implementation.
For the stable distribution (buster), these problems have been fixed in
version 90.0.4430.85-1~deb10u1.
We recommend that you upgrade your chromium packages.
For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=Drkg
-----END PGP SIGNATURE-----
Reply to: