Debian DSA-4606-1 : chromium - security update

high Nessus Plugin ID 133109

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in the chromium web browser.

- CVE-2019-13725 Gengming Liu and Jianyu Chen discovered a use-after-free issue in the bluetooth implementation.

- CVE-2019-13726 Sergei Glazunov discovered a buffer overflow issue.

- CVE-2019-13727 @piochu discovered a policy enforcement error.

- CVE-2019-13728 Rong Jian and Guang Gong discovered an out-of-bounds write error in the v8 JavaScript library.

- CVE-2019-13729 Zhe Jin discovered a use-after-free issue.

- CVE-2019-13730 Soyeon Park and Wen Xu discovered the use of a wrong type in the v8 JavaScript library.

- CVE-2019-13732 Sergei Glazunov discovered a use-after-free issue in the WebAudio implementation.

- CVE-2019-13734 Wenxiang Qian discovered an out-of-bounds write issue in the sqlite library.

- CVE-2019-13735 Gengming Liu and Zhen Feng discovered an out-of-bounds write issue in the v8 JavaScript library.

- CVE-2019-13736 An integer overflow issue was discovered in the pdfium library.

- CVE-2019-13737 Mark Amery discovered a policy enforcement error.

- CVE-2019-13738 Johnathan Norman and Daniel Clark discovered a policy enforcement error.

- CVE-2019-13739 xisigr discovered a user interface error.

- CVE-2019-13740 Khalil Zhani discovered a user interface error.

- CVE-2019-13741 Michal Bentkowski discovered that user input could be incompletely validated.

- CVE-2019-13742 Khalil Zhani discovered a user interface error.

- CVE-2019-13743 Zhiyang Zeng discovered a user interface error.

- CVE-2019-13744 Prakash discovered a policy enforcement error.

- CVE-2019-13745 Luan Herrera discovered a policy enforcement error.

- CVE-2019-13746 David Erceg discovered a policy enforcement error.

- CVE-2019-13747 Ivan Popelyshev and Andre Bonatti discovered an uninitialized value.

- CVE-2019-13748 David Erceg discovered a policy enforcement error.

- CVE-2019-13749 Khalil Zhani discovered a user interface error.

- CVE-2019-13750 Wenxiang Qian discovered insufficient validation of data in the sqlite library.

- CVE-2019-13751 Wenxiang Qian discovered an uninitialized value in the sqlite library.

- CVE-2019-13752 Wenxiang Qian discovered an out-of-bounds read issue in the sqlite library.

- CVE-2019-13753 Wenxiang Qian discovered an out-of-bounds read issue in the sqlite library.

- CVE-2019-13754 Cody Crews discovered a policy enforcement error.

- CVE-2019-13755 Masato Kinugawa discovered a policy enforcement error.

- CVE-2019-13756 Khalil Zhani discovered a user interface error.

- CVE-2019-13757 Khalil Zhani discovered a user interface error.

- CVE-2019-13758 Khalil Zhani discovered a policy enforecement error.

- CVE-2019-13759 Wenxu Wu discovered a user interface error.

- CVE-2019-13761 Khalil Zhani discovered a user interface error.

- CVE-2019-13762 csanuragjain discovered a policy enforecement error.

- CVE-2019-13763 weiwangpp93 discovered a policy enforecement error.

- CVE-2019-13764 Soyeon Park and Wen Xu discovered the use of a wrong type in the v8 JavaScript library.

- CVE-2019-13767 Sergei Glazunov discovered a use-after-free issue.

- CVE-2020-6377 Zhe Jin discovered a use-after-free issue.

- CVE-2020-6378 Antti Levomaki and Christian Jalio discovered a use-after-free issue.

- CVE-2020-6379 Guang Gong discovered a use-after-free issue.

- CVE-2020-6380 Sergei Glazunov discovered an error verifying extension messages.

Solution

Upgrade the chromium packages.

For the oldstable distribution (stretch), security support for chromium has been discontinued.

For the stable distribution (buster), these problems have been fixed in version 79.0.3945.130-1~deb10u1.

See Also

https://security-tracker.debian.org/tracker/CVE-2019-13725

https://security-tracker.debian.org/tracker/CVE-2019-13726

https://security-tracker.debian.org/tracker/CVE-2019-13727

https://security-tracker.debian.org/tracker/CVE-2019-13728

https://security-tracker.debian.org/tracker/CVE-2019-13729

https://security-tracker.debian.org/tracker/CVE-2019-13730

https://security-tracker.debian.org/tracker/CVE-2019-13732

https://security-tracker.debian.org/tracker/CVE-2019-13734

https://security-tracker.debian.org/tracker/CVE-2019-13735

https://security-tracker.debian.org/tracker/CVE-2019-13736

https://security-tracker.debian.org/tracker/CVE-2019-13737

https://security-tracker.debian.org/tracker/CVE-2019-13738

https://security-tracker.debian.org/tracker/CVE-2019-13739

https://security-tracker.debian.org/tracker/CVE-2019-13740

https://security-tracker.debian.org/tracker/CVE-2019-13741

https://security-tracker.debian.org/tracker/CVE-2019-13742

https://security-tracker.debian.org/tracker/CVE-2019-13743

https://security-tracker.debian.org/tracker/CVE-2019-13744

https://security-tracker.debian.org/tracker/CVE-2019-13745

https://security-tracker.debian.org/tracker/CVE-2019-13746

https://security-tracker.debian.org/tracker/CVE-2019-13747

https://security-tracker.debian.org/tracker/CVE-2019-13748

https://security-tracker.debian.org/tracker/CVE-2019-13749

https://security-tracker.debian.org/tracker/CVE-2019-13750

https://security-tracker.debian.org/tracker/CVE-2019-13751

https://security-tracker.debian.org/tracker/CVE-2019-13752

https://security-tracker.debian.org/tracker/CVE-2019-13753

https://security-tracker.debian.org/tracker/CVE-2019-13754

https://security-tracker.debian.org/tracker/CVE-2019-13755

https://security-tracker.debian.org/tracker/CVE-2019-13756

https://security-tracker.debian.org/tracker/CVE-2019-13757

https://security-tracker.debian.org/tracker/CVE-2019-13758

https://security-tracker.debian.org/tracker/CVE-2019-13759

https://security-tracker.debian.org/tracker/CVE-2019-13761

https://security-tracker.debian.org/tracker/CVE-2019-13762

https://security-tracker.debian.org/tracker/CVE-2019-13763

https://security-tracker.debian.org/tracker/CVE-2019-13764

https://security-tracker.debian.org/tracker/CVE-2019-13767

https://security-tracker.debian.org/tracker/CVE-2020-6377

https://security-tracker.debian.org/tracker/CVE-2020-6378

https://security-tracker.debian.org/tracker/CVE-2020-6379

https://security-tracker.debian.org/tracker/CVE-2020-6380

https://security-tracker.debian.org/tracker/source-package/chromium

https://packages.debian.org/source/buster/chromium

https://www.debian.org/security/2020/dsa-4606

Plugin Details

Severity: High

ID: 133109

File Name: debian_DSA-4606.nasl

Version: 1.5

Type: local

Agent: unix

Published: 1/21/2020

Updated: 3/2/2020

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:chromium, cpe:/o:debian:debian_linux:10.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/20/2020

Vulnerability Publication Date: 12/10/2019

Reference Information

CVE: CVE-2019-13725, CVE-2019-13726, CVE-2019-13727, CVE-2019-13728, CVE-2019-13729, CVE-2019-13730, CVE-2019-13732, CVE-2019-13734, CVE-2019-13735, CVE-2019-13736, CVE-2019-13737, CVE-2019-13738, CVE-2019-13739, CVE-2019-13740, CVE-2019-13741, CVE-2019-13742, CVE-2019-13743, CVE-2019-13744, CVE-2019-13745, CVE-2019-13746, CVE-2019-13747, CVE-2019-13748, CVE-2019-13749, CVE-2019-13750, CVE-2019-13751, CVE-2019-13752, CVE-2019-13753, CVE-2019-13754, CVE-2019-13755, CVE-2019-13756, CVE-2019-13757, CVE-2019-13758, CVE-2019-13759, CVE-2019-13761, CVE-2019-13762, CVE-2019-13763, CVE-2019-13764, CVE-2019-13767, CVE-2020-6377, CVE-2020-6378, CVE-2020-6379, CVE-2020-6380

DSA: 4606