[arch-security] [ASA-201605-28] chromium: multiple issues
Remi Gacogne
rgacogne at archlinux.org
Sat May 28 09:10:42 UTC 2016
Arch Linux Security Advisory ASA-201605-28
==========================================
Severity: High
Date : 2016-05-28
CVE-ID : CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 CVE-2016-1675
CVE-2016-1676 CVE-2016-1677 CVE-2016-1678 CVE-2016-1679
CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 CVE-2016-1683
CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687
CVE-2016-1688 CVE-2016-1689 CVE-2016-1690 CVE-2016-1691
CVE-2016-1692 CVE-2016-1693 CVE-2016-1694 CVE-2016-1695
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package chromium before version 51.0.2704.63-1 is vulnerable to
multiple issues including but not limited to policy bypass, denial of
service, information leak and arbitrary code execution.
Resolution
==========
Upgrade to 51.0.2704.63-1.
# pacman -Syu "chromium>=51.0.2704.63-1"
The problem has been fixed upstream in version 51.0.2704.63.
Workaround
==========
None.
Description
===========
- CVE-2016-1672:
Cross-origin bypass in extension bindings. Credit to Mariusz Mlynski.
- CVE-2016-1673:
Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
- CVE-2016-1674:
Cross-origin bypass in extensions. Credit to Mariusz Mlynski.
- CVE-2016-1675:
Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
- CVE-2016-1676:
Cross-origin bypass in extension bindings. Credit to Rob Wu.
- CVE-2016-1677:
Type confusion in V8. Credit to Guang Gong of Qihoo 360.
- CVE-2016-1678:
Heap overflow in V8. Credit to Christian Holler.
- CVE-2016-1679:
Heap use-after-free in V8 bindings. Credit to Rob Wu.
- CVE-2016-1680:
Heap use-after-free in Skia. Credit to Atte Kettunen of OUSPG.
- CVE-2016-1681:
Heap overflow in PDFium. Credit to Aleksandar Nikolic of Cisco Talos.
- CVE-2016-1682:
CSP bypass for ServiceWorker. Credit to KingstonTime.
- CVE-2016-1683:
Out-of-bounds access in libxslt. Credit to Nicolas Gregoire.
- CVE-2016-1684:
Integer overflow in libxslt. Credit to Nicolas Gregoire.
- CVE-2016-1685:
Out-of-bounds read in PDFium. Credit to Ke Liu of Tencent's Xuanwu LAB.
- CVE-2016-1686:
Out-of-bounds read in PDFium. Credit to Ke Liu of Tencent's Xuanwu LAB.
- CVE-2016-1687:
Information leak in extensions. Credit to Rob Wu.
- CVE-2016-1688:
Out-of-bounds read in V8. Credit to Max Korenko.
- CVE-2016-1689:
Heap buffer overflow in media. Credit to Atte Kettunen of OUSPG.
- CVE-2016-1690:
Heap use-after-free in Autofill. Credit to Rob Wu.
- CVE-2016-1691:
Heap buffer-overflow in Skia. Credit to Atte Kettunen of OUSPG.
- CVE-2016-1692:
Limited cross-origin bypass in ServiceWorker. Credit to Til Jasper Ullrich.
- CVE-2016-1693:
HTTP Download of Software Removal Tool. Credit to Khalil Zhani.
- CVE-2016-1694:
HPKP pins removed on cache clearance. Credit to Ryan Lester and Bryant
Zadegan.
- CVE-2016-1695:
Various fixes from internal audits, fuzzing and other initiatives.
Impact
======
A remote attacker can access sensitive information, cause a denial of
service by application crash or possibly execute arbitrary code on the
affected host.
References
==========
http://googlechromereleases.blogspot.fr/2016/05/stable-channel-update_25.html
https://access.redhat.com/security/cve/CVE-2016-1672
https://access.redhat.com/security/cve/CVE-2016-1673
https://access.redhat.com/security/cve/CVE-2016-1674
https://access.redhat.com/security/cve/CVE-2016-1675
https://access.redhat.com/security/cve/CVE-2016-1676
https://access.redhat.com/security/cve/CVE-2016-1677
https://access.redhat.com/security/cve/CVE-2016-1678
https://access.redhat.com/security/cve/CVE-2016-1679
https://access.redhat.com/security/cve/CVE-2016-1680
https://access.redhat.com/security/cve/CVE-2016-1681
https://access.redhat.com/security/cve/CVE-2016-1682
https://access.redhat.com/security/cve/CVE-2016-1683
https://access.redhat.com/security/cve/CVE-2016-1684
https://access.redhat.com/security/cve/CVE-2016-1685
https://access.redhat.com/security/cve/CVE-2016-1686
https://access.redhat.com/security/cve/CVE-2016-1687
https://access.redhat.com/security/cve/CVE-2016-1688
https://access.redhat.com/security/cve/CVE-2016-1689
https://access.redhat.com/security/cve/CVE-2016-1690
https://access.redhat.com/security/cve/CVE-2016-1691
https://access.redhat.com/security/cve/CVE-2016-1692
https://access.redhat.com/security/cve/CVE-2016-1693
https://access.redhat.com/security/cve/CVE-2016-1694
https://access.redhat.com/security/cve/CVE-2016-1695
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160528/99694085/attachment.asc>
More information about the arch-security
mailing list