[arch-security] [ASA-201507-18] chromium: multiple issues
Remi Gacogne
rgacogne at archlinux.org
Thu Jul 23 15:53:52 UTC 2015
Arch Linux Security Advisory ASA-201507-18
==========================================
Severity: High
Date : 2015-07-23
CVE-ID : CVE-2015-1270 CVE-2015-1271 CVE-2015-1272 CVE-2015-1273
CVE-2015-1274 CVE-2015-1276 CVE-2015-1277 CVE-2015-1278 CVE-2015-1279
CVE-2015-1280 CVE-2015-1281 CVE-2015-1282 CVE-2015-1283 CVE-2015-1284
CVE-2015-1285 CVE-2015-1286 CVE-2015-1287 CVE-2015-1288 CVE-2015-1289
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package chromium before version 44.0.2403.89-1 is vulnerable to
multiple issues including but not limited to denial of service, CSP and
SOP bypass and spell-checking dictionaries hijack.
Resolution
==========
Upgrade to 44.0.2403.89-1.
# pacman -Syu "chromium>=44.0.2403.89-1"
The problem has been fixed upstream in version 44.0.2403.89.
Workaround
==========
None.
Description
===========
- CVE-2015-1270:
Uninitialized memory read in ICU.
- CVE-2015-1271:
Heap overflow in pdfium.
- CVE-2015-1272, CVE-2015-1273, CVE-2015-1279:
Use-after-free related to unexpected GPU process termination.
- CVE-2015-1274:
Settings allowed executable files to run immediately after download.
- CVE-2015-1276 :
Use-after-free in IndexedDB.
- CVE-2015-1277:
Use-after-free in accessibility.
- CVE-2015-1278:
URL spoofing using pdf files.
- CVE-2015-1280:
Memory corruption in skia.
- CVE-2015-1281:
CSP bypass.
- CVE-2015-1282:
Use-after-free in pdfium.
- CVE-2015-1283:
Heap-buffer-overflow in expat.
- CVE-2015-1284:
Use-after-free in blink.
- CVE-2015-1285:
Information leak in XSS auditor.
- CVE-2015-1286:
UXSS in blink.
- CVE-2015-1287:
SOP bypass with CSS.
- CVE-2015-1288:
Spell checking dictionaries fetched over HTTP.
- CVE-2015-1289:
Various fixes from internal audits, fuzzing and other initiatives.
Impact
======
A remote attacker can bypass the Same-Origin Policy or the Content
Security Policy of a website, hijack spell-checking dictionaries, cause
a denial of service or have other unspecified impact.
References
==========
http://googlechromereleases.blogspot.fr/2015/07/stable-channel-update_21.html
https://access.redhat.com/security/cve/CVE-2015-1270
https://access.redhat.com/security/cve/CVE-2015-1271
https://access.redhat.com/security/cve/CVE-2015-1272
https://access.redhat.com/security/cve/CVE-2015-1273
https://access.redhat.com/security/cve/CVE-2015-1274
https://access.redhat.com/security/cve/CVE-2015-1276
https://access.redhat.com/security/cve/CVE-2015-1277
https://access.redhat.com/security/cve/CVE-2015-1278
https://access.redhat.com/security/cve/CVE-2015-1279
https://access.redhat.com/security/cve/CVE-2015-1280
https://access.redhat.com/security/cve/CVE-2015-1281
https://access.redhat.com/security/cve/CVE-2015-1282
https://access.redhat.com/security/cve/CVE-2015-1283
https://access.redhat.com/security/cve/CVE-2015-1284
https://access.redhat.com/security/cve/CVE-2015-1285
https://access.redhat.com/security/cve/CVE-2015-1286
https://access.redhat.com/security/cve/CVE-2015-1287
https://access.redhat.com/security/cve/CVE-2015-1288
https://access.redhat.com/security/cve/CVE-2015-1289
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150723/cce2de81/attachment.asc>
More information about the arch-security
mailing list