[arch-security] [ASA-201503-5] chromium: multiple issues
Remi Gacogne
rgacogne at archlinux.org
Thu Mar 5 09:43:56 UTC 2015
Arch Linux Security Advisory ASA-201503-5
=========================================
Severity: Critical
Date : 2015-03-05
CVE-ID : CVE-2015-1212 CVE-2015-1213 CVE-2015-1214 CVE-2015-1215
CVE-2015-1216 CVE-2015-1217 CVE-2015-1218 CVE-2015-1219 CVE-2015-1220
CVE-2015-1221 CVE-2015-1222 CVE-2015-1223 CVE-2015-1224 CVE-2015-1225
CVE-2015-1226 CVE-2015-1227 CVE-2015-1228 CVE-2015-1229 CVE-2015-1230
CVE-2015-1231
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package chromium before version 41.0.2272.76-1 is vulnerable to
multiple issues. While the exact impact has not been disclosed by the
vendor, most issues has been classified as having a high or critical impact.
Resolution
==========
Upgrade to 41.0.2272.76-1.
# pacman -Syu "chromium>=41.0.2272.76-1"
The problem has been fixed upstream in version 41.0.2272.76.
Workaround
==========
None.
Description
===========
- CVE-2015-1212:
Out-of-bounds write in media.
- CVE-2015-1213, CVE-2015-1214, CVE-2015-1215:
Out-of-bounds write in skia filters.
- CVE-2015-1216:
Use-after-free in v8 bindings.
- CVE-2015-1217:
Type confusion in v8 bindings.
- CVE-2015-1218:
Use-after-free in dom.
- CVE-2015-1219:
Integer overflow in webgl.
- CVE-2015-1220:
Use-after-free in gif decoder.
- CVE-2015-1221:
Use-after-free in web databases.
- CVE-2015-1222:
Use-after-free in service workers.
- CVE-2015-1223:
Use-after-free in dom.
- CVE-2015-1224:
Out-of-bounds read in vpxdecoder.
- CVE-2015-1225:
Out-of-bounds read in pdfium.
- CVE-2015-1226:
Validation issue in debugger.
- CVE-2015-1227:
Uninitialized value in blink.
- CVE-2015-1228:
Uninitialized value in rendering.
- CVE-2015-1229:
Cookie injection via proxies.
- CVE-2015-1230:
Type confusion in v8.
- CVE-2015-1231:
Various fixes from internal audits, fuzzing and other initiatives.
Impact
======
There isn't enough information disclosed by the vendor at this moment.
At least one issue has been classified as critical by the vendor
(https://code.google.com/p/chromium/issues/detail?id=460145), so
arbitrary remote code execution can not be ruled out.
References
==========
http://googlechromereleases.blogspot.fr/2015/03/stable-channel-update.html
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1212
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1213
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1214
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1215
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1216
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1217
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1218
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1219
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1220
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1221
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1222
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1223
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1224
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1225
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1226
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1227
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1228
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1229
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1230
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1231
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150305/613d43af/attachment.asc>
More information about the arch-security
mailing list