[arch-security] [ASA-201507-18] chromium: multiple issues
rgacogne at archlinux.org
Thu Jul 23 15:53:52 UTC 2015
Arch Linux Security Advisory ASA-201507-18
Date : 2015-07-23
CVE-ID : CVE-2015-1270 CVE-2015-1271 CVE-2015-1272 CVE-2015-1273
CVE-2015-1274 CVE-2015-1276 CVE-2015-1277 CVE-2015-1278 CVE-2015-1279
CVE-2015-1280 CVE-2015-1281 CVE-2015-1282 CVE-2015-1283 CVE-2015-1284
CVE-2015-1285 CVE-2015-1286 CVE-2015-1287 CVE-2015-1288 CVE-2015-1289
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package chromium before version 44.0.2403.89-1 is vulnerable to
multiple issues including but not limited to denial of service, CSP and
SOP bypass and spell-checking dictionaries hijack.
Upgrade to 44.0.2403.89-1.
# pacman -Syu "chromium>=44.0.2403.89-1"
The problem has been fixed upstream in version 44.0.2403.89.
Uninitialized memory read in ICU.
Heap overflow in pdfium.
- CVE-2015-1272, CVE-2015-1273, CVE-2015-1279:
Use-after-free related to unexpected GPU process termination.
Settings allowed executable files to run immediately after download.
- CVE-2015-1276 :
Use-after-free in IndexedDB.
Use-after-free in accessibility.
URL spoofing using pdf files.
Memory corruption in skia.
Use-after-free in pdfium.
Heap-buffer-overflow in expat.
Use-after-free in blink.
Information leak in XSS auditor.
UXSS in blink.
SOP bypass with CSS.
Spell checking dictionaries fetched over HTTP.
Various fixes from internal audits, fuzzing and other initiatives.
A remote attacker can bypass the Same-Origin Policy or the Content
Security Policy of a website, hijack spell-checking dictionaries, cause
a denial of service or have other unspecified impact.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 801 bytes
Desc: OpenPGP digital signature
More information about the arch-security