-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1861
                     chromium-browser security update
                               1 August 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           chromium-browser
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-5137 CVE-2016-5136 CVE-2016-5135
                   CVE-2016-5134 CVE-2016-5133 CVE-2016-5132
                   CVE-2016-5131 CVE-2016-5130 CVE-2016-5129
                   CVE-2016-5128 CVE-2016-5127 CVE-2016-1711
                   CVE-2016-1710 CVE-2016-1709 CVE-2016-1708
                   CVE-2016-1707 CVE-2016-1706 CVE-2016-1705
                   CVE-2016-1704  

Reference:         ASB-2016.0077
                   ASB-2016.0067

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3637

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3637-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
July 31, 2016                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : chromium-browser
CVE ID         : CVE-2016-1704 CVE-2016-1705 CVE-2016-1706 CVE-2016-1707
                 CVE-2016-1708 CVE-2016-1709 CVE-2016-1710 CVE-2016-1711
                 CVE-2016-5127 CVE-2016-5128 CVE-2016-5129 CVE-2016-5130
                 CVE-2016-5131 CVE-2016-5132 CVE-2016-5133 CVE-2016-5134
                 CVE-2016-5135 CVE-2016-5136 CVE-2016-5137

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2016-1704

    The chrome development team found and fixed various issues during
    internal auditing.

CVE-2016-1705

    The chrome development team found and fixed various issues during
    internal auditing.

CVE-2016-1706

    Pinkie Pie discovered a way to escape the Pepper Plugin API sandbox.

CVE-2016-1707

    xisigr discovered a URL spoofing issue.

CVE-2016-1708

    Adam Varsan discovered a use-after-free issue.

CVE-2016-1709

    ChenQin a buffer overflow issue in the sfntly library.

CVE-2016-1710

    Mariusz Mlynski discovered a same-origin bypass.

CVE-2016-1711

    Mariusz Mlynski discovered another same-origin bypass.

CVE-2016-5127

    cloudfuzzer discovered a use-after-free issue.

CVE-2016-5128

    A same-origin bypass issue was discovered in the v8 javascript library.

CVE-2016-5129

    Jeonghoon Shin discovered a memory corruption issue in the v8 javascript
    library.

CVE-2016-5130

    Widih Matar discovered a URL spoofing issue.

CVE-2016-5131

    Nick Wellnhofer discovered a use-after-free issue in the libxml2 library.

CVE-2016-5132

    Ben Kelly discovered a same-origin bypass.

CVE-2016-5133

    Patch Eudor discovered an issue in proxy authentication.

CVE-2016-5134

    Paul Stone discovered an information leak in the Proxy Auto-Config
    feature.

CVE-2016-5135

    ShenYeYinJiu discovered a way to bypass the Content Security Policy.

CVE-2016-5136

    Rob Wu discovered a use-after-free issue.

CVE-2016-5137

    Xiaoyin Liu discovered a way to discover whether an HSTS web side had been
    visited.

For the stable distribution (jessie), these problems have been fixed in
version 52.0.2743.82-1~deb8u1.

For the testing (stretch) and unstable (sid) distributions, these problems
have been fixed in version 52.0.2743.82-1.

We recommend that you upgrade your chromium-browser packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=
=YNYq
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=NecH
-----END PGP SIGNATURE-----