• [SECURITY] [DSA 4906-1] chromium security update

    From Michael Gilbert@21:1/5 to All on Wed Apr 28 04:00:02 2021
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-4906-1 security@debian.org https://www.debian.org/security/ Michael Gilbert
    April 27, 2021 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : chromium
    CVE ID : CVE-2021-21201 CVE-2021-21202 CVE-2021-21203 CVE-2021-21204
    CVE-2021-21205 CVE-2021-21207 CVE-2021-21208 CVE-2021-21209
    CVE-2021-21210 CVE-2021-21211 CVE-2021-21212 CVE-2021-21213
    CVE-2021-21214 CVE-2021-21215 CVE-2021-21216 CVE-2021-21217
    CVE-2021-21218 CVE-2021-21219 CVE-2021-21221 CVE-2021-21222
    CVE-2021-21223 CVE-2021-21224 CVE-2021-21225 CVE-2021-21226

    Several vulnerabilities have been discovered in the chromium web browser.

    CVE-2021-21201

    Gengming Liu and Jianyu Chen discovered a use-after-free issue.

    CVE-2021-21202

    David Erceg discovered a use-after-free issue in extensions.

    CVE-2021-21203

    asnine discovered a use-after-free issue in Blink/Webkit.

    CVE-2021-21204

    Tsai-Simek, Jeanette Ulloa, and Emily Voigtlander discovered a
    use-after-free issue in Blink/Webkit.

    CVE-2021-21205

    Alison Huffman discovered a policy enforcement error.

    CVE-2021-21207

    koocola and Nan Wang discovered a use-after-free in the indexed database.

    CVE-2021-21208

    Ahmed Elsobky discovered a data validation error in the QR code scanner.

    CVE-2021-21209

    Tom Van Goethem discovered an implementation error in the Storage API.

    CVE-2021-21210

    @bananabr discovered an error in the networking implementation.

    CVE-2021-21211

    Akash Labade discovered an error in the navigation implementation.

    CVE-2021-21212

    Hugo Hue and Sze Yui Chau discovered an error in the network configuration
    user interface.

    CVE-2021-21213

    raven discovered a use-after-free issue in the WebMIDI implementation.

    CVE-2021-21214

    A use-after-free issue was discovered in the networking implementation.

    CVE-2021-21215

    Abdulrahman Alqabandi discovered an error in the Autofill feature.

    CVE-2021-21216

    Abdulrahman Alqabandi discovered an error in the Autofill feature.

    CVE-2021-21217

    Zhou Aiting discovered use of uninitialized memory in the pdfium library.

    CVE-2021-21218

    Zhou Aiting discovered use of uninitialized memory in the pdfium library.

    CVE-2021-21219

    Zhou Aiting discovered use of uninitialized memory in the pdfium library.

    CVE-2021-21221

    Guang Gong discovered insufficient validation of untrusted input.

    CVE-2021-21222

    Guang Gong discovered a buffer overflow issue in the v8 javascript
    library.

    CVE-2021-21223

    Guang Gong discovered an integer overflow issue.

    CVE-2021-21224

    Jose Martinez discovered a type error in the v8 javascript library.

    CVE-2021-21225

    Brendon Tiszka discovered an out-of-bounds memory access issue in the v8
    javascript library.

    CVE-2021-21226

    Brendon Tiszka discovered a use-after-free issue in the networking
    implementation.

    For the stable distribution (buster), these problems have been fixed in
    version 90.0.4430.85-1~deb10u1.

    We recommend that you upgrade your chromium packages.

    For the detailed security status of chromium please refer to
    its security tracker page at: https://security-tracker.debian.org/tracker/chromium

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQQzBAEBCgAdFiEEIwTlZiOEpzUxIyp4mD40ZYkUaygFAmCIvYEACgkQmD40ZYkU ayg9fCAAjphN4kZAOT12EphLMxc0GLIgweQjU9fg9kWba4JlkqevuhI87qfBb1xn ENC4pz6CDpWExt2qFuSPxHDE88B2EcHVKiCHgKPN4Lxwjd7/WNCskhlOyvEwVDW1 +vylgXzwFem/8aJWSms3Iun/VBpVV0/c9XFTcTzzJtqPaddnQyh2EO1sJJy9sa1R r030G/KBJtWk3Ng7eoqCZi1ecj+Dnp2YIEXkjruDYo2oX545qsCEkQDFJcpOcApD oB9g4B696apIhb44th94WjCgfIEGsbNd1b8AKvc/KNNL6vuBH3HGQD0kntOINOXG xOPEVPWT60jywYfaW6FUxsi/n5TzS3QhTZwymoDD/DiN2RMEx46SaPTo+bjhv54X JW0avcqXA2qvR5XPb+Y/wqe/XGWg8YOHU+sTXJ58qWZ/q35MK3u7yjpODIXAWSJS GymgwV7d+T6nl2WIHv9Lmg5M0Dm2qhWtkMss1OdKbYiBqmmYjndZZZByxtMbv+e6 7/2/uyu3iHOC6MLnnCP2Dq9ccXMILsC8TrYkg5tciKRoWAvP/v9z04HXWteM/7zI 6D3u1ZUarSJZPImBOJoqz/1p5rlWSN121jCHyP75a0I62UxU11E36UBQhOS6MAPb fXj06hkRRZs9pNXBGpBvy9bHRtmtRGm8PfGNUEzCEhwP5CW4YOvjXgV9SqPAJX5i UitrTmnsTLC4UNjKzoZBXSw+uM/Cw61088vR8IDzT/CsqI8kM400L0o1gNhU0ozZ GiKzF1Ay/8eFUL7Olt7kUqeinkgc4TidKOsl6DMvOjQBhsK6MtqK4YcHfJ/fRlix gTWYjbe1leT2ViMRO51E3DjrkPfoFqfqTw4M2V1ba30Gfhy/tFLiIzq5ROnO4eWu iIviq6rrvCgIKdNg7iNTkws+GoVann+aqnqsYkpO/q+xI2YoxSkDfat+lqbvi4ii HLzqOD/JeeODu7IjfEga95iGAEEgpCzWuraYJpjoqM37NV6uFrRTiUyuQOHJGcCG nC6tQK6WZQ9t1V8hV5Sy0DjgmshY61XyYqwawUxzmlhltYsJ3kQbj2+rrtCsJc4p ePosM1+FvwtE/XpgItBtEQddOQqPNtWZ8YlrSdY4887Rvkkqv4/ZRdD0Qh53DM8q RsTVp6kCmhcYXHDSX/gPXHIpG1MYhPWcrLHIwKpiQLvNLl/yJ6sWOT1gqyPU7ZNM uK6QdF4VIqrEKSk+GuzHYQpibkJ1RBEnRQAziwJlExbHsNKcVfL0EGEirMBchcky Q1W5NlqBPpwMq9cTVnYXzXpC9/ls6pYKy8TXtNV/T6hDU0QNx1fE3qyDjJgaMka/ TefkoRqL5r+yGHJNz/q01LbMk1gbdw==
    =Drkg
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)