Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.3442 chromium-browser security update 5 November 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: chromium-browser Publisher: Debian Operating System: Debian GNU/Linux 9 Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Unauthorised Access -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-17477 CVE-2018-17476 CVE-2018-17475 CVE-2018-17474 CVE-2018-17473 CVE-2018-17471 CVE-2018-17470 CVE-2018-17469 CVE-2018-17468 CVE-2018-17467 CVE-2018-17466 CVE-2018-17465 CVE-2018-17464 CVE-2018-17463 CVE-2018-17462 CVE-2018-5179 Reference: ASB-2018.0266 ESB-2018.3259 Original Bulletin: http://www.debian.org/security/2018/dsa-4330 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4330-1 security@debian.org https://www.debian.org/security/ Michael Gilbert November 02, 2018 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : chromium-browser CVE ID : CVE-2018-5179 CVE-2018-17462 CVE-2018-17463 CVE-2018-17464 CVE-2018-17465 CVE-2018-17466 CVE-2018-17467 CVE-2018-17468 CVE-2018-17469 CVE-2018-17470 CVE-2018-17471 CVE-2018-17473 CVE-2018-17474 CVE-2018-17475 CVE-2018-17476 CVE-2018-17477 Several vulnerabilities have been discovered in the chromium web browser. CVE-2018-5179 Yannic Boneberger discovered an error in the ServiceWorker implementation. CVE-2018-17462 Ned Williamson and Niklas Baumstark discovered a way to escape the sandbox. CVE-2018-17463 Ned Williamson and Niklas Baumstark discovered a remote code execution issue in the v8 javascript library. CVE-2018-17464 xisigr discovered a URL spoofing issue. CVE-2018-17465 Lin Zuojian discovered a use-after-free issue in the v8 javascript library. CVE-2018-17466 Omair discovered a memory corruption issue in the angle library. CVE-2018-17467 Khalil Zhani discovered a URL spoofing issue. CVE-2018-17468 Jams Lee discovered an information disclosure issue. CVE-2018-17469 Zhen Zhou discovered a buffer overflow issue in the pdfium library. CVE-2018-17470 Zhe Jin discovered a memory corruption issue in the GPU backend implementation. CVE-2018-17471 Lnyas Zhang discovered an issue with the full screen user interface. CVE-2018-17473 Khalil Zhani discovered a URL spoofing issue. CVE-2018-17474 Zhe Jin discovered a use-after-free issue. CVE-2018-17475 Vladimir Metnew discovered a URL spoofing issue. CVE-2018-17476 Khalil Zhani discovered an issue with the full screen user interface. CVE-2018-17477 Aaron Muir Hamilton discovered a user interface spoofing issue in the extensions pane. This update also fixes a buffer overflow in the embedded lcms library included with chromium. For the stable distribution (stretch), these problems have been fixed in version 70.0.3538.67-1~deb9u1. We recommend that you upgrade your chromium-browser packages. For the detailed security status of chromium-browser please refer to its security tracker page at: https://security-tracker.debian.org/tracker/chromium-browser Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQQzBAEBCgAdFiEEluhy7ASCBulP9FUWuNayzQLW9HMFAlvcOIQACgkQuNayzQLW 9HP+1iAAsLTGaiN2DOVoaZcy7J81dIbvflucvy8wdch0sFPiqlP0V3PLr04yBKBG vEZcbGSsdUzCX5oT/eF4SG4qDyY7lSVKCKA8kTvu4UmwnJD8XwouOaKMtsgdcrSc GcChQ9zSBSlRBm6Aq0UvirkfCDz2W/zEAjUQZFqBCsNAC+2886SDO+kXwxXKv9ol 9P5tfKh+9+t10FMpj0qlBLwb6bdGqjum4iStxyIZEvX9tQ+6H/P6xhog4EoturMH lerPgiWtItpnFxZX7bCCaFDNaMdByXWCw829k2Rc0+kX6KzUVLbgQaeNlmED2Pn3 EI8c+ABVsE7lJ0w6DTf9KLMYYkPD4NiREWmipptF1gdKDoTKmksAGMDae+Q600wT 8Yy0AAS4S33qliqFuveUMvCqvMR0DAnw8mn8Li1s2OcI2YRKeqEGvXwltqj2RIfz pvzxVlDHx7Go/FIWO4j3o6MhsjVMUQNDXuFl8xkDzgRiICuFEibyKdXNgCEYyUwc Nk/iXzRLxQyWjy1p9fWrtk2EpL97kuOIBtLf1SH9VC4O/uJyZ/H8L/hGA6esx99z 8AGpwy/zTVimff3dj1/+BtIFHhdWY3zhydlAchVkvZrpGMBRNHz1H1RWy/wx6IIy JGb3LP1U/narlqf0vYKUQW2oDVFybXM5Exqwm4c6ipBYxWkuOYd4bXqx/ojMAgHC ar135UrX2zdLIUyFVpICbFFUxQUil92VYdwPuJWXXAJdzzOMuz42UoM2xSqv0oRj DRAU7/QFpz0Ilrf3C0+ktirWvo9GSNm5Kq5xNgC9Khp9uppu6cXHDCZxCCOQz6xX yOYrYjzGeYB8EYrlVPVT1YmKHJ1/FqCjoJ3IkkCsIo8MnCR9olO0AK1smo21Dvim +OcdJax6xWn4aIKbZDqL1GUYRotMoVfsnEbrsqBrsrLiWqlsmvVALN12083NK+zB 2OhYdU2D5oWep4Eb92+RI1ykk1wDaW9bpbdIOcK48HFAejk2PmZX2hhIgbrek0uP /Lu5FZn7NehFIjAxYIQ2qAk9vNdXmk6u3MrAFC96VoBFaIvg09MXuA/K0nIOnryW 17n0WxUjk8/pFfgRMJFW7oobEvw0NFvHFNEteP+b1T1ucJj/2CEAtMGE73UbHnv/ 03ez0boUiejkJmShpsPoWt02j/w4pfZ2vEDGlzBj0h3Bof8CmLJ422r0tfB5Vrp+ GuCxK7mQQItwatAMxyfXjBx+KxBROwb5mcQ0E9AwAonvsfgzrAgcoXAofV1oMiRy UvxdDnkJ69wblQ+ahyFjjdhR8+L1VNHHuQkgxfXCdXRxLdCzt4GHk5EFHh/5zGdX Ay238uDIBhE1NLHpUSX2D6/cMGFggA== =AINb - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW9+FgGaOgq3Tt24GAQhGsg//ZIG7H4rpILi5qlWC0KpgLqAGecu6I4pZ 8bdx5XjUzMBQ1zMUeXeVxsb4XdN2DgWYzdj1oG4rdG86Wq9gEoAGxyQwKDwxGWKS GUv7Bq9gv411VoKSfG7pWeOydV/+xazNsEx0yVtHihcBuf1+bKku10zpMUI31agX uRM4oc/LFv0H3IB/kuLC6dtBhTf+tL2o9f4pKdddlFcwogVEJWVP/9Vyp9oLrjIY mO0ENDTCa8CtpefXD92F3aFdr1wX7grFvwvlfCehTpqst77kfNKswzr7i6bkL7Wk k3uS5UbotTS/6mLvXIw0fgjleMfoiFGCWlvN9fnF9alwJmusj44VJ++mYHfuPUCI 4vk0BPMOKuL4QKLsojYq2lYPpNhRKQYBE04+aUJbR1d+QsiZHMd8gE4yU8Vu7Gmd 2oRR9tGWhCr3w5FC4kF6QIeRkvCqKM9jAfWcIwOd6/mqDIQREHs0XpY2jLXk3fFa KcKcKQAMrZ9kchRjK2jNcn/ZJE6PcOPzUNu/7RA+IL13BV9qlueKFOQaAWMHxvqi 5byTm+l0T0ahJQi0zdKRS5KBp72+V26PV4bUwrZhEDt6hwREqgpG/nYJW1AJkLPI H/+nR9dtByf+W3QmhXdhMO9CChBmqZVIY/ndb0E1FNt/UQ9nqk1QY+1MQYE6kAPu fHUP8jCi/aE= =io4J -----END PGP SIGNATURE-----