Debian: DSA-3238-1: chromium-browser security update

    Date26 Apr 2015
    CategoryDebian
    38
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities were discovered in the chromium web browser. CVE-2015-1235
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3238-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                           Michael Gilbert
    April 26, 2015                         http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : chromium-browser
    CVE ID         : CVE-2015-1235 CVE-2015-1236 CVE-2015-1237 CVE-2015-1238
                     CVE-2015-1240 CVE-2015-1241 CVE-2015-1242 CVE-2015-1244
                     CVE-2015-1245 CVE-2015-1246 CVE-2015-1247 CVE-2015-1248
                     CVE-2015-1249 CVE-2015-3333 CVE-2015-3334 CVE-2015-3336
    
    Several vulnerabilities were discovered in the chromium web browser.
    
    CVE-2015-1235
    
        A Same Origin Policy bypass issue was discovered in the HTML parser.
    
    CVE-2015-1236
    
        Amitay Dobo discovered a Same Origin Policy bypass in the Web Audio API.
    
    CVE-2015-1237
    
        Khalil Zhani discovered a use-after-free issue in IPC.
    
    CVE-2015-1238
    
        cloudfuzzer discovered an out-of-bounds write in the skia library.
    
    CVE-2015-1240
    
        w3bd3vil discovered an out-of-bounds read in the WebGL implementation.
    
    CVE-2015-1241
    
        Phillip Moon and Matt Weston discovered a way to trigger local user
        interface actions remotely via a crafted website.
    
    CVE-2015-1242
    
        A type confusion issue was discovered in the v8 javascript library.
    
    CVE-2015-1244
    
        Mike Ruddy discovered a way to bypass the HTTP Strict Transport Security
        policy.
    
    CVE-2015-1245
    
        Khalil Zhani discovered a use-after-free issue in the pdfium library.
    
    CVE-2015-1246
    
        Atte Kettunen discovered an out-of-bounds read issue in webkit/blink.
    
    CVE-2015-1247
    
        Jann Horn discovered that "file:" URLs in OpenSearch documents were not
        sanitized, which could allow local files to be read remotely when using
        the OpenSearch feature from a crafted website.
    
    CVE-2015-1248
    
        Vittorio Gambaletta discovered a way to bypass the SafeBrowsing feature,
        which could allow the remote execution of a downloaded executable file.
    
    CVE-2015-1249
    
        The chrome 41 development team found various issues from internal
        fuzzing, audits, and other studies.
    
    CVE-2015-3333
    
        Multiple issues were discovered and fixed in v8 4.2.7.14.
    
    CVE-2015-3334
    
        It was discovered that remote websites could capture video data from
        attached web cameras without permission.
    
    CVE-2015-3336
    
        It was discovered that remote websites could cause user interface
        disruptions like window fullscreening and mouse pointer locking.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 42.0.2311.90-1~deb8u1.
    
    For the testing (stretch) and unstable (sid) distributions, these problems
    have been fixed in version 42.0.2311.90-1.
    
    We recommend that you upgrade your chromium-browser packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.