ArchLinux: 201510-8: chromium: multiple issues
Summary
- CVE-2015-6755 (cross-origin bypass):
Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
- CVE-2015-6756 (use-after-free):
Use-after-free in PDFium.
- CVE-2015-6757 (use-after-free):
Use-after-free in ServiceWorker. Credit to Collin Payne.
- CVE-2015-6758:
Bad-cast in PDFium. Credit to Atte Kettunen of OUSPG.
- CVE-2015-6759 (information leakage):
Information leakage in LocalStorage. Credit to Muneaki Nishimura
(nishimunea).
- CVE-2015-6760 (improper error handling):
Improper error handling in libANGLE. Credit to lastland.net.
- CVE-2015-6761 (memory corruption):
Memory corruption in FFMpeg. Credit to Aki Helin of OUSPG and anonymous.
- CVE-2015-6762 (cross-origin resource sharing bypass):
CORS bypass via CSS fonts. Credit to Muneaki Nishimura (nishimunea).
- CVE-2015-6763:
Various fixes from internal audits, fuzzing and other initiatives.
Resolution
Upgrade to 46.0.2490.71-1.
# pacman -Syu "chromium>=46.0.2490.71-1"
The problem has been fixed upstream in version 46.0.2490.71.
References
https://chromereleases.googleblog.com/2015/10/stable-channel-update.html https://access.redhat.com/security/cve/CVE-2015-6755 https://access.redhat.com/security/cve/CVE-2015-6756 https://access.redhat.com/security/cve/CVE-2015-6757 https://access.redhat.com/security/cve/CVE-2015-6758 https://access.redhat.com/security/cve/CVE-2015-6759 https://access.redhat.com/security/cve/CVE-2015-6760 https://access.redhat.com/security/cve/CVE-2015-6761 https://access.redhat.com/security/cve/CVE-2015-6762 https://access.redhat.com/security/cve/CVE-2015-6763
Workaround
None.