[arch-security] [ASA-201607-12] chromium: multiple issues

Remi Gacogne rgacogne at archlinux.org
Sun Jul 24 10:43:15 UTC 2016


Arch Linux Security Advisory ASA-201607-12
==========================================

Severity: Critical
Date    : 2016-07-24
CVE-ID  : CVE-2016-1705 CVE-2016-1706 CVE-2016-1708 CVE-2016-1709
          CVE-2016-1710 CVE-2016-1711 CVE-2016-5127 CVE-2016-5128
          CVE-2016-5129 CVE-2016-5130 CVE-2016-5131 CVE-2016-5132
          CVE-2016-5133 CVE-2016-5134 CVE-2016-5135 CVE-2016-5136
          CVE-2016-5137
Package : chromium
Type    : multiple issues
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package chromium before version 52.0.2743.82-1 is vulnerable to
multiple issues.

Resolution
==========

Upgrade to 52.0.2743.82-1.

# pacman -Syu "chromium>=52.0.2743.82-1"

The problems have been fixed upstream in version 52.0.2743.82.

Workaround
==========

None.

Description
===========

- CVE-2016-1705 (arbitrary code execution)

Various fixes from internal audits, fuzzing and other initiatives.

- CVE-2016-1706 (sandbox escape)

Sandbox escape in PPAPI. Credit to Pinkie Pie.

- CVE-2016-1708 (arbitrary code execution)

Use-after-free in Extensions. Credit to Adam Varsan.

- CVE-2016-1709 (arbitrary code execution)

Heap-buffer-overflow in sfntly. Credit to ChenQin of Topsec Security Team.

- CVE-2016-1710, CVE-2016-1711 (same-origin policy bypass)

Same-origin bypass in Blink. Credit to Mariusz Mlynski.

- CVE-2016-5127 (arbitrary code execution)

Use-after-free in Blink. Credit to cloudfuzzer.

- CVE-2016-5128 (same-origin policy bypass)

Same-origin bypass in V8.

- CVE-2016-5129 (arbitrary code execution)

Memory corruption in V8. Credit to Jeonghoon Shin.

- CVE-2016-5130 (URL spoofing)

URL spoofing. Credit to Wadih Matar.

- CVE-2016-5131 (arbitrary code execution)

Use-after-free in libxml. Credit to Nick Wellnhofer.

- CVE-2016-5132 (same-origin policy bypass)

Limited same-origin bypass in Service Workers. Credit to Ben Kelly.

- CVE-2016-5133 (man-in-the-middle)

Origin confusion in proxy authentication. Credit to Patch Eudor.

- CVE-2016-5134 (information leakage)

URL leakage via PAC script. Credit to Paul Stone.

- CVE-2016-5135 (content security policy bypass)

Content-Security-Policy bypass. Credit to ShenYeYinJiu of  Tencent
Security Response Center, TSRC.

- CVE-2016-5136 (arbitrary code execution)

Use after free in extensions. Credit to Rob Wu.

- CVE-2016-5137 (information leakage)

History sniffing with HSTS and CSP. Credit to Xiaoyin Liu.

Impact
======

A remote attacker can access sensitive information, bypass policies or
execute arbitrary code on the affected host.

References
==========

https://googlechromereleases.blogspot.fr/2016/07/stable-channel-update.html
https://access.redhat.com/security/cve/CVE-2016-1705
https://access.redhat.com/security/cve/CVE-2016-1706
https://access.redhat.com/security/cve/CVE-2016-1708
https://access.redhat.com/security/cve/CVE-2016-1709
https://access.redhat.com/security/cve/CVE-2016-1710
https://access.redhat.com/security/cve/CVE-2016-1711
https://access.redhat.com/security/cve/CVE-2016-5127
https://access.redhat.com/security/cve/CVE-2016-5128
https://access.redhat.com/security/cve/CVE-2016-5129
https://access.redhat.com/security/cve/CVE-2016-5130
https://access.redhat.com/security/cve/CVE-2016-5131
https://access.redhat.com/security/cve/CVE-2016-5132
https://access.redhat.com/security/cve/CVE-2016-5133
https://access.redhat.com/security/cve/CVE-2016-5134
https://access.redhat.com/security/cve/CVE-2016-5135
https://access.redhat.com/security/cve/CVE-2016-5136
https://access.redhat.com/security/cve/CVE-2016-5137

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160724/895aef8a/attachment.asc>


More information about the arch-security mailing list