-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0193
                         chromium security update
                              18 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-21116 CVE-2021-21115 CVE-2021-21114
                   CVE-2021-21113 CVE-2021-21112 CVE-2021-21111
                   CVE-2021-21110 CVE-2021-21109 CVE-2021-21108
                   CVE-2021-21107 CVE-2021-21106 CVE-2020-16043
                   CVE-2020-15995  

Reference:         ASB-2021.0002
                   ESB-2021.0074

Original Bulletin: 
   https://www.debian.org/security/2021/dsa-4832

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4832-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 16, 2021                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : chromium
CVE ID         : CVE-2020-15995 CVE-2020-16043 CVE-2021-21106 CVE-2021-21107
                 CVE-2021-21108 CVE-2021-21109 CVE-2021-21110 CVE-2021-21111
                 CVE-2021-21112 CVE-2021-21113 CVE-2021-21114 CVE-2021-21115
                 CVE-2021-21116
Debian Bug     : 979533

Multiple security issues were discovered in the Chromium web browser, which
could result in the execution of arbitrary code, denial of service
or information disclosure.

For the stable distribution (buster), these problems have been fixed in
version 87.0.4280.141-0.1~deb10u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=wU5Y
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYATTz+NLKJtyKPYoAQhZPQ/9FAOHvxJvmXZ8jKNoW/Kek1rdPxxQYcgd
bniagSrin9Z7HlkNk9E8XTBaiej8xUQKgIV+QH7EPau8/tA0JMSmqYfQnpcj1YrY
+Fz0HDMMoTF6xW+aEuXBkRs4L/gC1j/Vtm+iZ9AHOFTec8zs45IyhBVSQOjvh5uY
E7DZckliWerUaIsj62yRxUlCqzkzQ9tjjpey4ioYeIzLoSlvggxUrsWjUfCujXPR
08Sxmg7GivqxTXVPHfb2JCaU8YGa99NbV08Quv9m1l3fZFkxGfIeSzzq6pMYGbOC
AlzqQjctABw7Y8REF2aRUfj8tyNOEtsW8jEoFEcqh7IVYgOxik1ilEf6Jg2Up4IN
augbDDP5Z4NU1P7wTBQ8tyK+535BX0h3o3krrUEpML5FmToEcfnkMW3wy1a83gaY
oulKkK4smt9lBfBPqA0SOwytYsADpOWTJzxM3mMaUTycBBh3mZP8CXQHn7hchtae
kOjoscq5oTTyHPy6641897dOJr+lzA3ARz/VZ/MOj9yHE1fTheeDclJ6waPDrSCD
DshbSjG9Q9FaeH3EEMg8SIJ5VO9/wroFLJ9lOYVHP0H3/fvu2cJQZTuBwN6aSGgM
qk0YtHm7uy8OpKK4zgqejHlz0ZTYUiV3prcrmc6NuOHTAFHYubwZ0T9Q6X74ps+6
GS3JUUtFy7A=
=zZNd
-----END PGP SIGNATURE-----