Arch Linux Security Advisory ASA-201605-7
========================================
Severity: High
Date    : 2016-05-05
CVE-ID  : CVE-2016-1660 CVE-2016-1661 CVE-2016-1662 CVE-2016-1663
          CVE-2016-1664 CVE-2016-1665 CVE-2016-1666
Package : chromium
Type    : multiple issues
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package chromium before version 50.0.2661.94-1 is vulnerable to
multiple issues leading to denial of service, information leakage or
arbitrary code execution.

Resolution
=========
Upgrade to 50.0.2661.94-1.

# pacman -Syu "chromium>=50.0.2661.94-1"

The problems have been fixed upstream in version 50.0.2661.94.

Workaround
=========
None.

Description
==========
- CVE-2016-1660:

Out-of-bounds write in Blink. Credit to Atte Kettunen of OUSPG.

- CVE-2016-1661:

Memory corruption in cross-process frames. Credit to Wadih Matar.

- CVE-2016-1662:

Use-after-free in extensions. Credit to Rob Wu.

- CVE-2016-1663:

Use-after-free in Blink's V8 bindings. Credit to anonymous.

- CVE-2016-1664:

Address bar spoofing. Credit to Wadih Matar.

- CVE-2016-1665:

Information leak in V8. Credit to HyungSeok Han.

- CVE-2016-1666:

Various fixes from internal audits, fuzzing and other initiatives.

Impact
=====
A remote attacker can cause a denial of service, access sensitive
information or possibly execute arbitrary code on the affected host.

References
=========
https://chromereleases.googleblog.com/2016/04/stable-channel-update_28.html
https://access.redhat.com/security/cve/CVE-2016-1660
https://access.redhat.com/security/cve/CVE-2016-1661
https://access.redhat.com/security/cve/CVE-2016-1662
https://access.redhat.com/security/cve/CVE-2016-1663
https://access.redhat.com/security/cve/CVE-2016-1664
https://access.redhat.com/security/cve/CVE-2016-1665
https://access.redhat.com/security/cve/CVE-2016-1666

ArchLinux: 201605-7: chromium: multiple issues

May 6, 2016

Summary

- CVE-2016-1660: Out-of-bounds write in Blink. Credit to Atte Kettunen of OUSPG.
- CVE-2016-1661:
Memory corruption in cross-process frames. Credit to Wadih Matar.
- CVE-2016-1662:
Use-after-free in extensions. Credit to Rob Wu.
- CVE-2016-1663:
Use-after-free in Blink's V8 bindings. Credit to anonymous.
- CVE-2016-1664:
Address bar spoofing. Credit to Wadih Matar.
- CVE-2016-1665:
Information leak in V8. Credit to HyungSeok Han.
- CVE-2016-1666:
Various fixes from internal audits, fuzzing and other initiatives.

Resolution

Upgrade to 50.0.2661.94-1. # pacman -Syu "chromium>=50.0.2661.94-1"
The problems have been fixed upstream in version 50.0.2661.94.

References

https://chromereleases.googleblog.com/2016/04/stable-channel-update_28.html https://access.redhat.com/security/cve/CVE-2016-1660 https://access.redhat.com/security/cve/CVE-2016-1661 https://access.redhat.com/security/cve/CVE-2016-1662 https://access.redhat.com/security/cve/CVE-2016-1663 https://access.redhat.com/security/cve/CVE-2016-1664 https://access.redhat.com/security/cve/CVE-2016-1665 https://access.redhat.com/security/cve/CVE-2016-1666

Severity
CVE-2016-1664 CVE-2016-1665 CVE-2016-1666
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE

Workaround

None.

Related News