• [SECURITY] [DSA 4846-1] chromium security update

    From Michael Gilbert@21:1/5 to All on Sun Feb 7 20:10:01 2021
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-4846-1 security@debian.org https://www.debian.org/security/ Michael Gilbert February 07, 2021 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : chromium
    CVE ID : CVE-2020-16044 CVE-2021-21117 CVE-2021-21118 CVE-2021-21119
    CVE-2021-21120 CVE-2021-21121 CVE-2021-21122 CVE-2021-21123
    CVE-2021-21124 CVE-2021-21125 CVE-2021-21126 CVE-2021-21127
    CVE-2021-21128 CVE-2021-21129 CVE-2021-21130 CVE-2021-21131
    CVE-2021-21132 CVE-2021-21133 CVE-2021-21134 CVE-2021-21135
    CVE-2021-21136 CVE-2021-21137 CVE-2021-21138 CVE-2021-21139
    CVE-2021-21140 CVE-2021-21141 CVE-2021-21142 CVE-2021-21143
    CVE-2021-21144 CVE-2021-21145 CVE-2021-21146 CVE-2021-21147

    Several vulnerabilities have been discovered in the chromium web browser.

    CVE-2020-16044

    Ned Williamson discovered a use-after-free issue in the WebRTC
    implementation.

    CVE-2021-21117

    Rory McNamara discovered a policy enforcement issue in Cryptohome.

    CVE-2021-21118

    Tyler Nighswander discovered a data validation issue in the v8 javascript
    library.

    CVE-2021-21119

    A use-after-free issue was discovered in media handling.

    CVE-2021-21120

    Nan Wang and Guang Gong discovered a use-after-free issue in the WebSQL
    implementation.

    CVE-2021-21121

    Leecraso and Guang Gong discovered a use-after-free issue in the Omnibox.

    CVE-2021-21122

    Renata Hodovan discovered a use-after-free issue in Blink/WebKit.

    CVE-2021-21123

    Maciej Pulikowski discovered a data validation issue.

    CVE-2021-21124

    Chaoyang Ding discovered a use-after-free issue in the speech recognizer.

    CVE-2021-21125

    Ron Masas discovered a policy enforcement issue.

    CVE-2021-21126

    David Erceg discovered a policy enforcement issue in extensions.

    CVE-2021-21127

    Jasminder Pal Singh discovered a policy enforcement issue in extensions.

    CVE-2021-21128

    Liang Dong discovered a buffer overflow issue in Blink/WebKit.

    CVE-2021-21129

    Maciej Pulikowski discovered a policy enforcement issue.

    CVE-2021-21130

    Maciej Pulikowski discovered a policy enforcement issue.

    CVE-2021-21131

    Maciej Pulikowski discovered a policy enforcement issue.

    CVE-2021-21132

    David Erceg discovered an implementation error in the developer tools.

    CVE-2021-21133

    wester0x01 discovered a policy enforcement issue.

    CVE-2021-21134

    wester0x01 discovered a user interface error.

    CVE-2021-21135

    ndevtk discovered an implementation error in the Performance API.

    CVE-2021-21136

    Shiv Sahni, Movnavinothan V, and Imdad Mohammed discovered a policy
    enforcement error.

    CVE-2021-21137

    bobbybear discovered an implementation error in the developer tools.

    CVE-2021-21138

    Weipeng Jiang discovered a use-after-free issue in the developer tools.

    CVE-2021-21139

    Jun Kokatsu discovered an implementation error in the iframe sandbox.

    CVE-2021-21140

    David Manouchehri discovered uninitialized memory in the USB
    implementation.

    CVE-2021-21141

    Maciej Pulikowski discovered a policy enforcement error.

    CVE-2021-21142

    Khalil Zhani discovered a use-after-free issue.

    CVE-2021-21143

    Allen Parker and Alex Morgan discovered a buffer overflow issue in
    extensions.

    CVE-2021-21144

    Leecraso and Guang Gong discovered a buffer overflow issue.

    CVE-2021-21145

    A use-after-free issue was discovered.

    CVE-2021-21146

    Alison Huffman and Choongwoo Han discovered a use-after-free issue.

    CVE-2021-21147

    Roman Starkov discovered an implementation error in the skia library.

    For the stable distribution (buster), these problems have been fixed in
    version 88.0.4324.146-1~deb10u1.

    We recommend that you upgrade your chromium packages.

    For the detailed security status of chromium please refer to
    its security tracker page at: https://security-tracker.debian.org/tracker/chromium

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQQzBAEBCgAdFiEEIwTlZiOEpzUxIyp4mD40ZYkUaygFAmAgOWAACgkQmD40ZYkU aygtGyAArkdhz8ru3JqXZGrt7jACotBh/lrS/U5piVuIpwViRCRaKRHtYq2HaSb0 //1heoKDmCreKZ1v1511sGFTlfNaHSgHm1Jlh+U/gnFAM2oSFbNZy2iT+TSJv8AP 7KJIF3Eifh+hDbPTgiRxJOIhWIpu+UpSLD5jYAz+xY0rHWE3QJubALC1vlqC2fRv zpv9zWpXZAXf4n15RjnKSr2iB7vKHiNCJQF+oLQeZIjGwYQP5lfgeza0QyZon33K JV7kCXOAy86PHd2q9IYXGT3VheGw9aPq6/fGdSOpIEwLSlawtoA4b2yQoI9OoDPO rd7BsY0x4jZqU6JtF4a2cTo6Pl3QJM49Chmcr1JMYJvShDvmYNcpt0ll6h53cYBM VOPKAMEHo8nns2wPwl+P2p4ZWRUUzLfDy9vfBWURS7KsaZ+5mEZfuaK6N1Z/GbNN R74Q+KmUwA9KX2r8l2dofVmMPmD78NnTKUD/6tZkDqXiJegtZ6cElV6BQhg3jV0t OzUOeLdOXN92PbLPqMRRMYLUcTsYbNkfZ6lOnVDwzNxyn9A7jaILUYSfD1i5WAo3 ps5ixMUZxy+/WpnMDpfbMCDj4+OUWCOB8J9vHDFekxjzKnP8f9R021YN7UZBusdm PQoyCj5zAI2OxlhMKGnI7RAo9/wz8m0bWolDoDoe/SCtb7r7TnYIPafh/vpHoQNL 50DQnNXmORUdP/bbUoFlkLuV1DyHGAeldU5fhyM83P9cUUN1e9l9zyYwsAAYRbiJ mVhCXQfvaCvfUkVqqAXqDXmEwO6qw4EQyQTDJIWv6x8Xa4kpx1mqTCiwbv6kwwx3 qWZTw8SuRqx311C8WlNjOR5qTIKy79dM7uZaN76YwKmiRKO79uN1WOmG2toKc78i JrEZF5tXs2GWqK5a3Ts7pBzQV1jXA5O09yHYWRWUzP1eil8ewMQKek7h8taJQ6cX TXQ9/yojbLTa1eWfQJejYI0rCYVilArPKlhB2p5saD0CO2bCqjOU7SiXN8lbUiPw Y1ykTbptHgmLDdwMtUm93dEKx86/q/AKITaK9vdHXxOdhMg4ITPQRnrXd804iT0h 76GRGhi7dMNNWpTDTWrhOPYwltumEitmDy05C/EpLAny43tWJdBR8/2zLD2/mkiY Vt7sbQn3OifrTzxwHHfko7JlrINpeanMhUYgViQSmjX07nEiab50f7U8sjvYOdHP yC17ZAkCMU+Pi4mpD2UdzNvKiNntYidYFHiTISmen1ZdNQGTy33dNFN/raVzvIVw DrXr+VJbPexpIc4CBmcxHBSaPZbLEBev1halhq/+MjOXzi3Xixs7E0/CPeKp/HdW IDplympw7i37TbFo9PF/v3v6WOsDhQ==
    =ckXH
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)