From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id B8FEE1382C5 for ; Tue, 24 Apr 2018 00:29:39 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 82BE6E0990; Tue, 24 Apr 2018 00:28:53 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 1F8A7E0933 for ; Tue, 24 Apr 2018 00:28:24 +0000 (UTC) Received: from localhost (pool-71-163-21-11.washdc.fios.verizon.net [71.163.21.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: bman) by smtp.gentoo.org (Postfix) with ESMTPSA id E2DDA335C2C for ; Tue, 24 Apr 2018 00:28:22 +0000 (UTC) Date: Mon, 23 Apr 2018 20:28:20 -0400 From: Aaron Bauman To: gentoo-announce@lists.gentoo.org Subject: [gentoo-announce] [ GLSA 201804-22 ] Chromium, Google Chrome: Multiple vulnerabilities Message-ID: <20180424002820.GA3667@monkey> Reply-To: security@gentoo.org Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="2fHTh5uZTiUOsy+g" Content-Disposition: inline User-Agent: Mutt/1.9.5 (2018-04-13) X-Archives-Salt: 475e8f64-2212-4227-b3bb-5a0f7b3a926a X-Archives-Hash: 332cb50da9b2ff76e31a4e063af22ee8 --2fHTh5uZTiUOsy+g Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201804-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium, Google Chrome: Multiple vulnerabilities Date: April 24, 2018 Bugs: #653696 ID: 201804-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis =3D=3D=3D=3D=3D=3D=3D=3D Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could result in the execution of arbitrary code. Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Google Chrome is one fast, simple, and secure browser for all your devices. Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 66.0.3359.117 >=3D 66.0.3359.117=20 2 www-client/google-chrome < 66.0.3359.117 >=3D 66.0.3359.117=20 ------------------------------------------------------------------- 2 affected packages Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Multiple vulnerabilities have been discovered in Chromium and Google Chrome. Please review the referenced CVE identifiers and Google Chrome Releases for details. Impact =3D=3D=3D=3D=3D=3D A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, bypass content security controls, or conduct URL spoofing. Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D There is no known workaround at this time. Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=3Dwww-client/chromium-66.0.3359.117" All Google Chrome users should upgrade to the latest version: # emerge --sync # emerge -a --oneshot -v ">=3Dwww-client/google-chrome-66.0.3359.117" References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 1 ] CVE-2018-6085 https://nvd.nist.gov/vuln/detail/CVE-2018-6085 [ 2 ] CVE-2018-6086 https://nvd.nist.gov/vuln/detail/CVE-2018-6086 [ 3 ] CVE-2018-6087 https://nvd.nist.gov/vuln/detail/CVE-2018-6087 [ 4 ] CVE-2018-6088 https://nvd.nist.gov/vuln/detail/CVE-2018-6088 [ 5 ] CVE-2018-6089 https://nvd.nist.gov/vuln/detail/CVE-2018-6089 [ 6 ] CVE-2018-6090 https://nvd.nist.gov/vuln/detail/CVE-2018-6090 [ 7 ] CVE-2018-6091 https://nvd.nist.gov/vuln/detail/CVE-2018-6091 [ 8 ] CVE-2018-6092 https://nvd.nist.gov/vuln/detail/CVE-2018-6092 [ 9 ] CVE-2018-6093 https://nvd.nist.gov/vuln/detail/CVE-2018-6093 [ 10 ] CVE-2018-6094 https://nvd.nist.gov/vuln/detail/CVE-2018-6094 [ 11 ] CVE-2018-6095 https://nvd.nist.gov/vuln/detail/CVE-2018-6095 [ 12 ] CVE-2018-6096 https://nvd.nist.gov/vuln/detail/CVE-2018-6096 [ 13 ] CVE-2018-6097 https://nvd.nist.gov/vuln/detail/CVE-2018-6097 [ 14 ] CVE-2018-6098 https://nvd.nist.gov/vuln/detail/CVE-2018-6098 [ 15 ] CVE-2018-6099 https://nvd.nist.gov/vuln/detail/CVE-2018-6099 [ 16 ] CVE-2018-6100 https://nvd.nist.gov/vuln/detail/CVE-2018-6100 [ 17 ] CVE-2018-6101 https://nvd.nist.gov/vuln/detail/CVE-2018-6101 [ 18 ] CVE-2018-6102 https://nvd.nist.gov/vuln/detail/CVE-2018-6102 [ 19 ] CVE-2018-6103 https://nvd.nist.gov/vuln/detail/CVE-2018-6103 [ 20 ] CVE-2018-6104 https://nvd.nist.gov/vuln/detail/CVE-2018-6104 [ 21 ] CVE-2018-6105 https://nvd.nist.gov/vuln/detail/CVE-2018-6105 [ 22 ] CVE-2018-6106 https://nvd.nist.gov/vuln/detail/CVE-2018-6106 [ 23 ] CVE-2018-6107 https://nvd.nist.gov/vuln/detail/CVE-2018-6107 [ 24 ] CVE-2018-6108 https://nvd.nist.gov/vuln/detail/CVE-2018-6108 [ 25 ] CVE-2018-6109 https://nvd.nist.gov/vuln/detail/CVE-2018-6109 [ 26 ] CVE-2018-6110 https://nvd.nist.gov/vuln/detail/CVE-2018-6110 [ 27 ] CVE-2018-6111 https://nvd.nist.gov/vuln/detail/CVE-2018-6111 [ 28 ] CVE-2018-6112 https://nvd.nist.gov/vuln/detail/CVE-2018-6112 [ 29 ] CVE-2018-6113 https://nvd.nist.gov/vuln/detail/CVE-2018-6113 [ 30 ] CVE-2018-6114 https://nvd.nist.gov/vuln/detail/CVE-2018-6114 [ 31 ] CVE-2018-6115 https://nvd.nist.gov/vuln/detail/CVE-2018-6115 [ 32 ] CVE-2018-6116 https://nvd.nist.gov/vuln/detail/CVE-2018-6116 [ 33 ] CVE-2018-6117 https://nvd.nist.gov/vuln/detail/CVE-2018-6117 [ 34 ] Google Chrome Release 20180417 https://chromereleases.googleblog.com/2018/04/stable-channel-update-= for-desktop.html Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201804-22 Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License =3D=3D=3D=3D=3D=3D=3D Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --2fHTh5uZTiUOsy+g Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAlreeiQACgkQpRQw84X1 dt1R7gf/SFoygis9pyPF+TgLJufEYALdfUozn1Gf4HcLHq8JWOQLwJrDX/+Kk3iE znqFTAJPpr9R8zLlMiwVObq1FuAL1lDSf9pCMiGZ2KgPrc5nDvJOQXYCORMn2YfG qVo1eucvNadxRbmjs40hRWU85sLVv0cuCj/ZEZ43JdYqTMgYDOVIOFxhwuMs6bTI 0dPXcqQ9mBZNrv7mhrV1FBmZVN6ZiIMMCF76ACiP3Zqkdp8XvB8RiTj0tjlBUO7D +9xAodUMrLq99/vPtbnQzMupKbP7IGPz8vByBAauAQQlN1XNjZmOe2nR0Nan/7m4 MRkIb/+rXyCnsZu6XChgV55LGmmjXQ== =BuQP -----END PGP SIGNATURE----- --2fHTh5uZTiUOsy+g--