-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1503
                         chromium security update
                                4 May 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Unauthorised Access             -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-21233 CVE-2021-21232 CVE-2021-21231
                   CVE-2021-21230 CVE-2021-21229 CVE-2021-21228
                   CVE-2021-21227  

Reference:         ASB-2021.0100
                   ESB-2021.1426

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2021/msg00092.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4911-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
May 03, 2021                          https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : chromium
CVE ID         : CVE-2021-21227 CVE-2021-21228 CVE-2021-21229 CVE-2021-21230
                 CVE-2021-21231 CVE-2021-21232 CVE-2021-21233

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2021-21227

    Gengming Liu discovered a data validation issue in the v8 javascript
    library.

CVE-2021-21228

    Rob Wu discovered a policy enforcement error.

CVE-2021-21229

    Mohit Raj discovered a user interface error in the file downloader.

CVE-2021-21230

    Manfred Paul discovered use of an incorrect type.

CVE-2021-21231

    Sergei Glazunov discovered a data validation issue in the v8 javascript
    library.

CVE-2021-21232

    Abdulrahman Alqabandi discovered a use-after-free issue in the developer
    tools.

CVE-2021-21233

    Omair discovered a buffer overflow issue in the ANGLE library.

For the stable distribution (buster), these problems have been fixed in
version 90.0.4430.93-1~deb10u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=EvIG
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=SR3G
-----END PGP SIGNATURE-----