[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 4906-1] chromium security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4906-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
April 27, 2021                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium
CVE ID         : CVE-2021-21201 CVE-2021-21202 CVE-2021-21203 CVE-2021-21204
                 CVE-2021-21205 CVE-2021-21207 CVE-2021-21208 CVE-2021-21209
                 CVE-2021-21210 CVE-2021-21211 CVE-2021-21212 CVE-2021-21213
                 CVE-2021-21214 CVE-2021-21215 CVE-2021-21216 CVE-2021-21217
                 CVE-2021-21218 CVE-2021-21219 CVE-2021-21221 CVE-2021-21222
                 CVE-2021-21223 CVE-2021-21224 CVE-2021-21225 CVE-2021-21226

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2021-21201

    Gengming Liu and Jianyu Chen discovered a use-after-free issue.

CVE-2021-21202

    David Erceg discovered a use-after-free issue in extensions.

CVE-2021-21203

    asnine discovered a use-after-free issue in Blink/Webkit.

CVE-2021-21204

    Tsai-Simek, Jeanette Ulloa, and Emily Voigtlander discovered a
    use-after-free issue in Blink/Webkit.

CVE-2021-21205

    Alison Huffman discovered a policy enforcement error.

CVE-2021-21207

    koocola and Nan Wang discovered a use-after-free in the indexed database.

CVE-2021-21208

    Ahmed Elsobky discovered a data validation error in the QR code scanner.

CVE-2021-21209

    Tom Van Goethem discovered an implementation error in the Storage API.

CVE-2021-21210

    @bananabr discovered an error in the networking implementation.

CVE-2021-21211

    Akash Labade discovered an error in the navigation implementation.

CVE-2021-21212

    Hugo Hue and Sze Yui Chau discovered an error in the network configuration
    user interface.

CVE-2021-21213

    raven discovered a use-after-free issue in the WebMIDI implementation.

CVE-2021-21214

    A use-after-free issue was discovered in the networking implementation.

CVE-2021-21215

    Abdulrahman Alqabandi discovered an error in the Autofill feature.

CVE-2021-21216

    Abdulrahman Alqabandi discovered an error in the Autofill feature.

CVE-2021-21217

    Zhou Aiting discovered use of uninitialized memory in the pdfium library.

CVE-2021-21218

    Zhou Aiting discovered use of uninitialized memory in the pdfium library.

CVE-2021-21219

    Zhou Aiting discovered use of uninitialized memory in the pdfium library.

CVE-2021-21221

    Guang Gong discovered insufficient validation of untrusted input.

CVE-2021-21222

    Guang Gong discovered a buffer overflow issue in the v8 javascript
    library.

CVE-2021-21223

    Guang Gong discovered an integer overflow issue.

CVE-2021-21224

    Jose Martinez discovered a type error in the v8 javascript library.

CVE-2021-21225

    Brendon Tiszka discovered an out-of-bounds memory access issue in the v8
    javascript library.

CVE-2021-21226

    Brendon Tiszka discovered a use-after-free issue in the networking
    implementation.

For the stable distribution (buster), these problems have been fixed in
version 90.0.4430.85-1~deb10u1.

We recommend that you upgrade your chromium packages.

For the detailed security status of chromium please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/chromium

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQQzBAEBCgAdFiEEIwTlZiOEpzUxIyp4mD40ZYkUaygFAmCIvYEACgkQmD40ZYkU
ayg9fCAAjphN4kZAOT12EphLMxc0GLIgweQjU9fg9kWba4JlkqevuhI87qfBb1xn
ENC4pz6CDpWExt2qFuSPxHDE88B2EcHVKiCHgKPN4Lxwjd7/WNCskhlOyvEwVDW1
+vylgXzwFem/8aJWSms3Iun/VBpVV0/c9XFTcTzzJtqPaddnQyh2EO1sJJy9sa1R
r030G/KBJtWk3Ng7eoqCZi1ecj+Dnp2YIEXkjruDYo2oX545qsCEkQDFJcpOcApD
oB9g4B696apIhb44th94WjCgfIEGsbNd1b8AKvc/KNNL6vuBH3HGQD0kntOINOXG
xOPEVPWT60jywYfaW6FUxsi/n5TzS3QhTZwymoDD/DiN2RMEx46SaPTo+bjhv54X
JW0avcqXA2qvR5XPb+Y/wqe/XGWg8YOHU+sTXJ58qWZ/q35MK3u7yjpODIXAWSJS
GymgwV7d+T6nl2WIHv9Lmg5M0Dm2qhWtkMss1OdKbYiBqmmYjndZZZByxtMbv+e6
7/2/uyu3iHOC6MLnnCP2Dq9ccXMILsC8TrYkg5tciKRoWAvP/v9z04HXWteM/7zI
6D3u1ZUarSJZPImBOJoqz/1p5rlWSN121jCHyP75a0I62UxU11E36UBQhOS6MAPb
fXj06hkRRZs9pNXBGpBvy9bHRtmtRGm8PfGNUEzCEhwP5CW4YOvjXgV9SqPAJX5i
UitrTmnsTLC4UNjKzoZBXSw+uM/Cw61088vR8IDzT/CsqI8kM400L0o1gNhU0ozZ
GiKzF1Ay/8eFUL7Olt7kUqeinkgc4TidKOsl6DMvOjQBhsK6MtqK4YcHfJ/fRlix
gTWYjbe1leT2ViMRO51E3DjrkPfoFqfqTw4M2V1ba30Gfhy/tFLiIzq5ROnO4eWu
iIviq6rrvCgIKdNg7iNTkws+GoVann+aqnqsYkpO/q+xI2YoxSkDfat+lqbvi4ii
HLzqOD/JeeODu7IjfEga95iGAEEgpCzWuraYJpjoqM37NV6uFrRTiUyuQOHJGcCG
nC6tQK6WZQ9t1V8hV5Sy0DjgmshY61XyYqwawUxzmlhltYsJ3kQbj2+rrtCsJc4p
ePosM1+FvwtE/XpgItBtEQddOQqPNtWZ8YlrSdY4887Rvkkqv4/ZRdD0Qh53DM8q
RsTVp6kCmhcYXHDSX/gPXHIpG1MYhPWcrLHIwKpiQLvNLl/yJ6sWOT1gqyPU7ZNM
uK6QdF4VIqrEKSk+GuzHYQpibkJ1RBEnRQAziwJlExbHsNKcVfL0EGEirMBchcky
Q1W5NlqBPpwMq9cTVnYXzXpC9/ls6pYKy8TXtNV/T6hDU0QNx1fE3qyDjJgaMka/
TefkoRqL5r+yGHJNz/q01LbMk1gbdw==
=Drkg
-----END PGP SIGNATURE-----


Reply to: