[ASA-201712-8] chromium: cross-site scripting

Remi Gacogne rgacogne at archlinux.org
Sat Dec 16 19:14:05 UTC 2017


Arch Linux Security Advisory ASA-201712-8
=========================================

Severity: High
Date    : 2017-12-16
CVE-ID  : CVE-2017-15429
Package : chromium
Type    : cross-site scripting
Remote  : Yes
Link    : https://security.archlinux.org/AVG-546

Summary
=======

The package chromium before version 63.0.3239.108-1 is vulnerable to
cross-site scripting.

Resolution
==========

Upgrade to 63.0.3239.108-1.

# pacman -Syu "chromium>=63.0.3239.108-1"

The problem has been fixed upstream in version 63.0.3239.108.

Workaround
==========

None.

Description
===========

A universal XSS has been found in the V8 component of the Chromium
browser before 63.0.3239.108.

Impact
======

A remote attacker can inject Javascript code via a universal cross-site
scripting flaw.

References
==========

https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop_14.html
https://crbug.com/788453
https://security.archlinux.org/CVE-2017-15429

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20171216/d849e991/attachment.asc>


More information about the arch-security mailing list