Debian: DSA-3776-1: chromium-browser security update

    Date30 Jan 2017
    CategoryDebian
    61
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in the chromium web browser. CVE-2017-5006
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3776-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                          Michael Gilbert
    January 31, 2017                      https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : chromium-browser
    CVE ID         : CVE-2017-5006 CVE-2017-5007 CVE-2017-5008 CVE-2017-5009
                     CVE-2017-5010 CVE-2017-5011 CVE-2017-5012 CVE-2017-5013
                     CVE-2017-5014 CVE-2017-5015 CVE-2017-5016 CVE-2017-5017
                     CVE-2017-5018 CVE-2017-5019 CVE-2017-5020 CVE-2017-5021
                     CVE-2017-5022 CVE-2017-5023 CVE-2017-5024 CVE-2017-5025
                     CVE-2017-5026
    
    Several vulnerabilities have been discovered in the chromium web browser.
    
    CVE-2017-5006
    
        Mariusz Mlynski discovered a cross-site scripting issue.
    
    CVE-2017-5007
    
        Mariusz Mlynski discovered another cross-site scripting issue.
    
    CVE-2017-5008
    
        Mariusz Mlynski discovered a third cross-site scripting issue.
    
    CVE-2017-5009
    
        Sean Stanek and Chip Bradford discovered an out-of-bounds memory
        issue in the webrtc library.
    
    CVE-2017-5010
    
        Mariusz Mlynski discovered a fourth cross-site scripting issue.
    
    CVE-2017-5011
    
        Khalil Zhani discovered a way to access unauthorized files in the
        developer tools.
    
    CVE-2017-5012
    
        Gergely Nagy discovered a heap overflow issue in the v8 javascript
        library.
    
    CVE-2017-5013
    
        Haosheng Wang discovered a URL spoofing issue.
    
    CVE-2017-5014
    
        sweetchip discovered a heap overflow issue in the skia library.
    
    CVE-2017-5015
    
        Armin Razmdjou discovered a URL spoofing issue.
    
    CVE-2017-5016
    
        Haosheng Wang discovered another URL spoofing issue.
    
    CVE-2017-5017
    
        danberm discovered an uninitialized memory issue in support for
        webm video files.
    
    CVE-2017-5018
    
        Rob Wu discovered a cross-site scripting issue.
    
    CVE-2017-5019
    
        Wadih Matar discovered a use-after-free issue.
    
    CVE-2017-5020
    
        Rob Wu discovered another cross-site scripting issue.
    
    CVE-2017-5021
    
        Rob Wu discovered a use-after-free issue in extensions.
    
    CVE-2017-5022
    
        PKAV Team discovered a way to bypass the Content Security Policy.
    
    CVE-2017-5023
    
        UK's National Cyber Security Centre (NCSC) discovered a type
        confusion issue.
    
    CVE-2017-5024
    
        Paul Mehta discovered a heap overflow issue in the ffmpeg library.
    
    CVE-2017-5025
    
        Paul Mehta discovered another heap overflow issue in the ffmpeg
        library.
    
    CVE-2017-5026
    
        Ronni Skansing discovered a user interface spoofing issue.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 56.0.2924.76-1~deb8u1.
    
    For the testing (stretch) and unstable (sid) distributions, these
    problems will be fixed soon.
    
    We recommend that you upgrade your chromium-browser packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"13","type":"x","order":"1","pct":52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":16,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"8","type":"x","order":"3","pct":32,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.