Arch Linux Security Advisory ASA-201604-10 ========================================== Severity: High Date : 2016-04-17 CVE-ID : CVE-2016-1651 CVE-2016-1652 CVE-2016-1653 CVE-2016-1654 CVE-2016-1655 CVE-2016-1657 CVE-2016-1658 CVE-2016-1659 Package : chromium Type : multiple issues Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package chromium before version 50.0.2661.75-1 is vulnerable to multiple issues. Resolution ========== Upgrade to 50.0.2661.75-1. # pacman -Syu "chromium>=50.0.2661.75-1" The problem has been fixed upstream in version 50.0.2661.75. Workaround ========== None. Description =========== - CVE-2016-1651: Out-of-bounds read in Pdfium JPEG2000 decoding. Credit to kdot working with HP's Zero Day Initiative. - CVE-2016-1652: Universal XSS in extension bindings. Credit to anonymous. - CVE-2016-1653: Out-of-bounds write in V8. Credit to Choongwoo Han. - CVE-2016-1654: Uninitialized memory read in media. Credit to Atte Kettunen of OUSPG. - CVE-2016-1655: Use-after-free related to extensions. Credit to Rob Wu. - CVE-2016-1657: Address bar spoofing. Credit to Luan Herrera. - CVE-2016-1658: Potential leak of sensitive information to malicious extensions. Credit to Antonio Sanso (@asanso) of Adobe. - CVE-2016-1659: Various fixes from internal audits, fuzzing and other initiatives. Impact ====== A remote attacker can access sensitive information, bypass security measures, cause a denial of service or have another unspecified impact on the affected host. References ========== http://googlechromereleases.blogspot.fr/2016/04/stable-channel-update_13.htm... https://access.redhat.com/security/cve/CVE-2016-1651 https://access.redhat.com/security/cve/CVE-2016-1652 https://access.redhat.com/security/cve/CVE-2016-1653 https://access.redhat.com/security/cve/CVE-2016-1654 https://access.redhat.com/security/cve/CVE-2016-1655 https://access.redhat.com/security/cve/CVE-2016-1657 https://access.redhat.com/security/cve/CVE-2016-1658 https://access.redhat.com/security/cve/CVE-2016-1659