Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.1861 chromium-browser security update 1 August 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: chromium-browser Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2016-5137 CVE-2016-5136 CVE-2016-5135 CVE-2016-5134 CVE-2016-5133 CVE-2016-5132 CVE-2016-5131 CVE-2016-5130 CVE-2016-5129 CVE-2016-5128 CVE-2016-5127 CVE-2016-1711 CVE-2016-1710 CVE-2016-1709 CVE-2016-1708 CVE-2016-1707 CVE-2016-1706 CVE-2016-1705 CVE-2016-1704 Reference: ASB-2016.0077 ASB-2016.0067 Original Bulletin: http://www.debian.org/security/2016/dsa-3637 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3637-1 security@debian.org https://www.debian.org/security/ Michael Gilbert July 31, 2016 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : chromium-browser CVE ID : CVE-2016-1704 CVE-2016-1705 CVE-2016-1706 CVE-2016-1707 CVE-2016-1708 CVE-2016-1709 CVE-2016-1710 CVE-2016-1711 CVE-2016-5127 CVE-2016-5128 CVE-2016-5129 CVE-2016-5130 CVE-2016-5131 CVE-2016-5132 CVE-2016-5133 CVE-2016-5134 CVE-2016-5135 CVE-2016-5136 CVE-2016-5137 Several vulnerabilities have been discovered in the chromium web browser. CVE-2016-1704 The chrome development team found and fixed various issues during internal auditing. CVE-2016-1705 The chrome development team found and fixed various issues during internal auditing. CVE-2016-1706 Pinkie Pie discovered a way to escape the Pepper Plugin API sandbox. CVE-2016-1707 xisigr discovered a URL spoofing issue. CVE-2016-1708 Adam Varsan discovered a use-after-free issue. CVE-2016-1709 ChenQin a buffer overflow issue in the sfntly library. CVE-2016-1710 Mariusz Mlynski discovered a same-origin bypass. CVE-2016-1711 Mariusz Mlynski discovered another same-origin bypass. CVE-2016-5127 cloudfuzzer discovered a use-after-free issue. CVE-2016-5128 A same-origin bypass issue was discovered in the v8 javascript library. CVE-2016-5129 Jeonghoon Shin discovered a memory corruption issue in the v8 javascript library. CVE-2016-5130 Widih Matar discovered a URL spoofing issue. CVE-2016-5131 Nick Wellnhofer discovered a use-after-free issue in the libxml2 library. CVE-2016-5132 Ben Kelly discovered a same-origin bypass. CVE-2016-5133 Patch Eudor discovered an issue in proxy authentication. CVE-2016-5134 Paul Stone discovered an information leak in the Proxy Auto-Config feature. CVE-2016-5135 ShenYeYinJiu discovered a way to bypass the Content Security Policy. CVE-2016-5136 Rob Wu discovered a use-after-free issue. CVE-2016-5137 Xiaoyin Liu discovered a way to discover whether an HSTS web side had been visited. For the stable distribution (jessie), these problems have been fixed in version 52.0.2743.82-1~deb8u1. For the testing (stretch) and unstable (sid) distributions, these problems have been fixed in version 52.0.2743.82-1. We recommend that you upgrade your chromium-browser packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQQcBAEBCgAGBQJXnmiAAAoJELjWss0C1vRzfkEf/iAQmyjeea5CZznERzq8DZ19 1/kZRSeEnF+mksPDiAWweFPvuLMrNPbWWJuciG7b6dxhLOHPjzoob0+d7WD73A2V iAHoHSAUPFlOXImSw2lheamgDOoqlmlIb7FAKe6T9e+WasI8y6S+gbSsClO+L7/n WU9N1PtCK1A6sizapxv2HlKnBsYDRmVcgsl90poBk/oV+IQ7ztOdEejos+sg7XOP 9g4/vtisSwwwMMv61LyV00IYBfw+Inq/6IVDPB0PrLUMhI+Mn9mwZAIyAdLsJAow tfySYV2QSgv2MYr+ln04XcMt4uvWDxQ+HJkIY6mRxZG6D4ysmkllCdB9RYvoBY0a mLrldEcD0+78PlMJEtBZ67WJPHINZhQIuy9dLftBsmw9ZXAeX42t5ZzamXdeU6mL 5bDRxMTm28ZV6d7thH/HQ+jiZjE0xEIneeVPQMZSEKsUj8OdNyfX7zYus2Dagqjx u/5pZX+HkDujUCXHu8sGE0zOQCEK7fpsYTcSjNdllorBtbVEqQY2w47uSNR3aN2L ud67Yn9+BtnJhds9lHIlwuEkPBL4doZZmoeLn5o8/mQm6EnHYN9lu4HiAjVjzufK vQ9mZovxaJAx23cmeLrr3mZyoQ5bc2tKCHVaBlJrA71Th31evIVhNsAZ/h371g3Z jELZw4o390N0CkiUKGA25LRdPX6KhNi+xJ8VlmAQhvvb5QRyBDAQOvJ9a5309FhH YWhEmRqZf+i7bPUC0XhcpWyG6AeStDSdLHnleLCkKNYuAiBJBYSXyGlv+mD935Nk PVFGrPa7U6WpeuEWZoyEzVNVF4IhQZlOspnNloDZiQw277lKNKUjxvUERU0ElK4k C9KO7U6hVrU/ilW1KgkPjEA1j0kdIX6luUFuh5IPOtkk//WD6BnPZBLCHaRjYp4G aJXrNOiR2YOcmeqNfoA7q+rtXmXEKj9GNNp0HzgcTZhTEV7/JG+rnplEypADVgOB yCz5T4nmMMEFJPhDlEr5cH70lZDpZ+Oul8BKAJGsIwbDB9JSTyXMzwoDVD5BO4k8 AwtMdLoXRxxKkQ5f/TUBOiCu7JAmPNl773HFVBbqtA+j3727sXfoc3sffPwIz8yp AMjYheT4xB3VBzSR+SzW352fz/NmpcoJCcisiVZut70+XCCu+lJZbQ4B0OT04KHa 2rtVpoNf8aUaaXXSlZIjJ4Cl0nefQT5nflJjKb7XcBeXwWpWyT9X4TittKjdlPHT BNWgKs4iN1xuyqZBKrGf8Ldy2VmNjdTZKeCaDnzHsmvbpl+eeoez58Lp/3dpyZAQ T02HeL3JM+JRq6RK4KSnwt9LWRP9DnM3kX6mf0SwFzmmzyBU3l72nnN2jG9NBGA= =YNYq - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBV56yx4x+lLeg9Ub1AQgjeA/9E/KJp5QoHJOIcFGHpRGCWQCKdlP8Futc WLCz3OuX3CR8nOxB862Uni8zWYO6bZEvYGikykcaEcIC4j8XHFQhpRL4LSma92X7 DYrEnm53c/vBSXF4yH5Zh/HfH5F8ykd0fk4GV5bZ/vhcWDIsQu0T/oDTMgR+88Y+ FlTznw9tFjZGt+mmu7aC/UY8To7qTUuHAw+AVuv5H1j0VKNAH+0NJnztFelqZfQ0 825vOfoB4Gp6fi7DAeZAnMXYZcSlMmuRsTP82YDeeEA/Ax/3sz/MmE4qTMwF/YYo H0L7UYA3GQFThhqAhXuDseUcdoaeRiftmZdVFX+J8yCdrMU6EdxDZZ1rJu7+sacv igZQaBDA3T+YKokbP1rR4FA/ZRwrglXSmGNjbZMBV/BZS/5qw7TAqPLcFYpe3QuF y6tOtIQmYxRwtRLLgdATRvygy/0FKtSDkKcmZYeuY77uS71lhU6dooaQg2auqRrr mHFHBgQqLjCfmkZC/J9KRbhDGzS34UyFTZg/GMmmMxNFNGTLVekn0QLmOMs9Il+j C2v0hRvjbm9yK/EsPB+zqWTmCTXE4d+oejhZE0Vdux2pUm/gDz/vWUE/9fyS33PV 5Ro2MbzjSHdJIC8dO3UxvVj6rCKAZLl4Tid5NmfRN8wogE8DGVERiB4SOEDVwlY7 prjkqUgED0Q= =NecH -----END PGP SIGNATURE-----