Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.1383 chromium-browser security update 1 June 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: chromium-browser Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2016-1695 CVE-2016-1694 CVE-2016-1693 CVE-2016-1692 CVE-2016-1691 CVE-2016-1690 CVE-2016-1689 CVE-2016-1688 CVE-2016-1687 CVE-2016-1686 CVE-2016-1685 CVE-2016-1684 CVE-2016-1683 CVE-2016-1682 CVE-2016-1681 CVE-2016-1680 CVE-2016-1679 CVE-2016-1678 CVE-2016-1677 CVE-2016-1676 CVE-2016-1675 CVE-2016-1674 CVE-2016-1673 CVE-2016-1672 CVE-2016-1670 CVE-2016-1669 CVE-2016-1668 CVE-2016-1667 Reference: ASB-2016.0059 ASB-2016.0055 Original Bulletin: http://www.debian.org/security/2016/dsa-3590 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3590-1 security@debian.org https://www.debian.org/security/ Michael Gilbert June 01, 2016 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : chromium-browser CVE ID : CVE-2016-1667 CVE-2016-1668 CVE-2016-1669 CVE-2016-1670 CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 CVE-2016-1675 CVE-2016-1676 CVE-2016-1677 CVE-2016-1678 CVE-2016-1679 CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 CVE-2016-1683 CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687 CVE-2016-1688 CVE-2016-1689 CVE-2016-1690 CVE-2016-1691 CVE-2016-1692 CVE-2016-1693 CVE-2016-1694 CVE-2016-1695 Several vulnerabilities have been discovered in the chromium web browser. CVE-2016-1667 Mariusz Mylinski discovered a cross-origin bypass. CVE-2016-1668 Mariusz Mylinski discovered a cross-origin bypass in bindings to v8. CVE-2016-1669 Choongwoo Han discovered a buffer overflow in the v8 javascript library. CVE-2016-1670 A race condition was found that could cause the renderer process to reuse ids that should have been unique. CVE-2016-1672 Mariusz Mylinski discovered a cross-origin bypass in extension bindings. CVE-2016-1673 Mariusz Mylinski discovered a cross-origin bypass in Blink/Webkit. CVE-2016-1674 Mariusz Mylinski discovered another cross-origin bypass in extension bindings. CVE-2016-1675 Mariusz Mylinski discovered another cross-origin bypass in Blink/Webkit. CVE-2016-1676 Rob Wu discovered a cross-origin bypass in extension bindings. CVE-2016-1677 Guang Gong discovered a type confusion issue in the v8 javascript library. CVE-2016-1678 Christian Holler discovered an overflow issue in the v8 javascript library. CVE-2016-1679 Rob Wu discovered a use-after-free issue in the bindings to v8. CVE-2016-1680 Atte Kettunen discovered a use-after-free issue in the skia library. CVE-2016-1681 Aleksandar Nikolic discovered an overflow issue in the pdfium library. CVE-2016-1682 KingstonTime discovered a way to bypass the Content Security Policy. CVE-2016-1683 Nicolas Gregoire discovered an out-of-bounds write issue in the libxslt library. CVE-2016-1684 Nicolas Gregoire discovered an integer overflow issue in the libxslt library. CVE-2016-1685 Ke Liu discovered an out-of-bounds read issue in the pdfium library. CVE-2016-1686 Ke Liu discovered another out-of-bounds read issue in the pdfium library. CVE-2016-1687 Rob Wu discovered an information leak in the handling of extensions. CVE-2016-1688 Max Korenko discovered an out-of-bounds read issue in the v8 javascript library. CVE-2016-1689 Rob Wu discovered a buffer overflow issue. CVE-2016-1690 Rob Wu discovered a use-after-free issue. CVE-2016-1691 Atte Kettunen discovered a buffer overflow issue in the skia library. CVE-2016-1692 Til Jasper Ullrich discovered a cross-origin bypass issue. CVE-2016-1693 Khalil Zhani discovered that the Software Removal Tool download was done over an HTTP connection. CVE-2016-1694 Ryan Lester and Bryant Zadegan discovered that pinned public keys would be removed when clearing the browser cache. CVE-2016-1695 The chrome development team found and fixed various issues during internal auditing. For the stable distribution (jessie), these problems have been fixed in version 51.0.2704.63-1~deb8u1. For the testing distribution (stretch), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 51.0.2704.63-1. We recommend that you upgrade your chromium-browser packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQQcBAEBCgAGBQJXTlq5AAoJELjWss0C1vRzX2kgALfATFCC+g4mUsxAHEX3v0Hv gnFgHgknu4bJ5JkkGord2TFpqWIBe6dq6ocSHpNqapiYOrhfuUFtU/x/l2lvaoWN hQTpbPzK+J2OxIruf3vNW1731NvYKMcNLsdMzxjaGVzxTxjJesB9u2yHEI3erUR9 YzSldrcB8s8fTiWQUcBQoQJkEvppvl7tHeZQIv2SrFQ8v/EstJ0Bk3VWw9AwgL/b /L2KBTIruEGikLGOsWkIST0Kzkx41D/LeIeIRbP1qs6JQUj0SHXyjLi5BccFcf2y MqSOst4q1t1g9aGREAfgSsJJTnDMpyLAEFLabHcKes0msil0JxTIDiaD6ePwEsb/ XygVpDcmPXPEnKLeh0kd/2Y4i1Q5r7tspQ1JFvolP3OG8m6egl25UZ/PGn2FZkgm Ie9uZx84S1x0ysrCph0lQtlf8Awe2nw7rQ2kAbNzgAW/Jd2w5w+eFBI3FzxemGX0 feHwbIqOn+TzbT4QhIsvbHrjbM3SbNmuj/fvpufqZDDIfDTSzIbfoQiSVach6gRo nK1Sy6nHkm0ygHm3w7ZO+eg8GCi35y+8dm+su6OfMOLG3P6MbwAWnPMMwioapFcH l5MTOXMsfYk0ny06ZFAnU2/0tTWbgJ4oiNPCJ56WjOeUuvCZF73GTKkMjgp5w7it DpB+ckAmrFsLTTRiMpwaxcdela/qMk1ZymeABmWG3/kxJdSL02U5K20GaokZGY9I iN5emq9LBhWQPGzp8P1GSAi4+4FNtlvXAJRRMt8q4CpcNOrIic7T3N5IAc0Xp5iZ iXT5wstBLZtFcTzphYYCovK4qIieqPP7GgH3RLzY8uZm9slG5ndb9bh7DoOued5P EBmbGyLEGHW+BLpMXO/1MZblj6m35R0A96QVzlCochH310M1Mc+CcET5dEqoYB90 6TLxsY6+Bd3dQ6p4S+58c0zFJE7HACeW/Kj4DGKHxscjW85G7ob8ZFM69pboGtYx w8lcHwwRaiFckN/l+PuNIi+HAVeEmOmcYW6/uGN32rtAV8/3+/xjylBrfuHLuoEh gBbpgOTHyrKeU33iTEMLS3QGNSPrrzNU9vOj46TVKyC7MNVwvCZR5vQZWr99KoQG FZKRVX4nHatbdDL4DW9k/opmBkYlfmakLvsvmhTmKKkoYKrDIRaI4+QkynZ2Azsc 5FR5lFNrHKzdoS9UgwoZtgrqUOSzekI0Bt8FQ9bOuYNEd3CF24HkcMjNiIdoo3c2 sbUMYKSyHHg1l+OYztCRjInOmEX9lzVcNM5HAJBLcr3csNEeiaMCO9QKGV2VEm4s 9p6YoI8VqCk2JF1hwVheKAP57rEnI9ViiLtSsExreuX6HYaVHi0EgGFJwOINxEA= =6Nmo - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBV0+CJox+lLeg9Ub1AQi8bg/8CIaKm1G4r1KdP03twf5nwG0QtvGMpNuy Y49fhb5M9DSkKa/gcf3Tgw5cmBBJbZmd/sq2nz5qfMcrouwZjVxl7lv666qLxWkz cclcKucOWtUDVQ0rYQc8yV6fiOHQ2bPkYGEMOiduRdgOvu7bEbP1FxV2kCfrLkXN 3I/ZAC5fa1LPgUgBQSXZBZJJAPtl4VuBq3fyBZX1jUDSLVS/8SXZdRm1Yk60S7+S QG5KmcGXzAcEiKy+T/YyF+wXhFrLQZIxKQ7Ik8eb8jD+YUoq/5FzhzobZ4VNPhYP vi2Wf5cGDMjG+qudos8eCux65Gttd20eoxATf1QTl4bPIRhsoZ04jhs5Q9IFXFnW e663gjHBujiJ4Z2kG2p+RDqFh11adPSlydo+SH+A/JtConoRVY/L6nPpMq8k/9b9 bPjfZAfm40ZqAKWnMVOteoXVKP1jgyismTDV5nr5a4edyvitWflS+8XC5yDCY2nT E5TyRgB+c/mbSby48WfvxDkzAMmQf/TiOoRAWqfXcHVMxNhZpfyzbKzWitivxAcz 4bH833l09VZpaYw2qUU7Nj9SbnHXjV2cuVcpUHc2KVT7La4dp5dgFVcaFcbELnwC gOzKE4reGOwDr7SyMgrjl5wxZZGEYZLIcBOV+7QV2Dzf7ghxoITaYNRJr/wxQlDO D+9rLUTI1KU= =Lbsh -----END PGP SIGNATURE-----