ESB-2018.0323 - [Debian] chromium-browser: Multiple vulnerabilities 2018-02-01

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0323
                     chromium-browser security update
                              1 February 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium-browser
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Access Privileged Data          -- Existing Account            
                   Cross-site Scripting            -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Unauthorised Access             -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-6054 CVE-2018-6053 CVE-2018-6052
                   CVE-2018-6051 CVE-2018-6050 CVE-2018-6049
                   CVE-2018-6048 CVE-2018-6047 CVE-2018-6046
                   CVE-2018-6045 CVE-2018-6043 CVE-2018-6042
                   CVE-2018-6041 CVE-2018-6040 CVE-2018-6039
                   CVE-2018-6038 CVE-2018-6037 CVE-2018-6036
                   CVE-2018-6035 CVE-2018-6034 CVE-2018-6033
                   CVE-2018-6032 CVE-2018-6031 CVE-2017-15429
                   CVE-2017-15420  

Reference:         ASB-2018.0037

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4103

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4103-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
January 31, 2018                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : chromium-browser
CVE ID         : CVE-2017-15420 CVE-2017-15429 CVE-2018-6031 CVE-2018-6032
                 CVE-2018-6033 CVE-2018-6034 CVE-2018-6035 CVE-2018-6036
                 CVE-2018-6037 CVE-2018-6038 CVE-2018-6039 CVE-2018-6040
                 CVE-2018-6041 CVE-2018-6042 CVE-2018-6043 CVE-2018-6045
                 CVE-2018-6046 CVE-2018-6047 CVE-2018-6048 CVE-2018-6049
                 CVE-2018-6050 CVE-2018-6051 CVE-2018-6052 CVE-2018-6053
                 CVE-2018-6054

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2017-15420

    Drew Springall discovered a URL spoofing issue.

CVE-2017-15429

    A cross-site scripting issue was discovered in the v8 javascript
    library.

CVE-2018-6031

    A use-after-free issue was discovered in the pdfium library.

CVE-2018-6032

    Jun Kokatsu discovered a way to bypass the same origin policy.

CVE-2018-6033

    Juho Nurminen discovered a race condition when opening downloaded
    files.

CVE-2018-6034

    Tobias Klein discovered an integer overflow issue.

CVE-2018-6035

    Rob Wu discovered a way for extensions to access devtools.

CVE-2018-6036

    UK's National Cyper Security Centre discovered an integer overflow
    issue.

CVE-2018-6037

    Paul Stone discovered an issue in the autofill feature.

CVE-2018-6038

    cloudfuzzer discovered a buffer overflow issue.

CVE-2018-6039

    Juho Nurminen discovered a cross-site scripting issue in the
    developer tools.

CVE-2018-6040

    WenXu Wu discovered a way to bypass the content security policy.

CVE-2018-6041

    Luan Herrera discovered a URL spoofing issue.

CVE-2018-6042

    Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6043

    A character escaping issue was discovered.

CVE-2018-6045

    Rob Wu discovered a way for extensions to access devtools.

CVE-2018-6046

    Rob Wu discovered a way for extensions to access devtools.

CVE-2018-6047

    Masato Kinugawa discovered an information leak issue.

CVE-2018-6048

    Jun Kokatsu discoverd a way to bypass the referrer policy.

CVE-2018-6049

    WenXu Wu discovered a user interface spoofing issue.

CVE-2018-6050

    Jonathan Kew discovered a URL spoofing issue.

CVE-2018-6051

    Anonio Sanso discovered an information leak issue.

CVE-2018-6052

    Tanner Emek discovered that the referrer policy implementation
    was incomplete.

CVE-2018-6053

    Asset Kabdenov discoved an information leak issue.

CVE-2018-6054

    Rob Wu discovered a use-after-free issue.

For the oldstable distribution (jessie), security support for chromium
has been discontinued.

For the stable distribution (stretch), these problems have been fixed in
version 64.0.3282.119-1~deb9u1.

We recommend that you upgrade your chromium-browser packages.

For the detailed security status of chromium-browser please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium-browser

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=7D0d
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=btEb
-----END PGP SIGNATURE-----

« Back to bulletins