Is there a web link with this info? https://search.debian.org/cgi-bin/omega?DB=en&P=DSA+3660-1
return no results. > On Sep 5, 2016, at 19:18, Michael Gilbert <mgilb...@debian.org> wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > - ------------------------------------------------------------------------- > Debian Security Advisory DSA-3660-1 secur...@debian.org > https://www.debian.org/security/ Michael Gilbert > September 05, 2016 https://www.debian.org/security/faq > - ------------------------------------------------------------------------- > > Package : chromium-browser > CVE ID : CVE-2016-5147 CVE-2016-5148 CVE-2016-5149 CVE-2016-5150 > CVE-2016-5151 CVE-2016-5152 CVE-2016-5153 CVE-2016-5154 > CVE-2016-5155 CVE-2016-5156 CVE-2016-5157 CVE-2016-5158 > CVE-2016-5159 CVE-2016-5160 CVE-2016-5161 CVE-2016-5162 > CVE-2016-5163 CVE-2016-5164 CVE-2016-5165 CVE-2016-5166 > CVE-2016-5167 > > Several vulnerabilities have been discovered in the chromium web browser. > > CVE-2016-5147 > > A cross-site scripting issue was discovered. > > CVE-2016-5148 > > Another cross-site scripting issue was discovered. > > CVE-2016-5149 > > Max Justicz discovered a script injection issue in extension handling. > > CVE-2016-5150 > > A use-after-free issue was discovered in Blink/Webkit. > > CVE-2016-5151 > > A use-after-free issue was discovered in the pdfium library. > > CVE-2016-5152 > > GiWan Go discovered a heap overflow issue in the pdfium library. > > CVE-2016-5153 > > Atte Kettunen discovered a use-after-destruction issue. > > CVE-2016-5154 > > A heap overflow issue was discovered in the pdfium library. > > CVE-2016-5155 > > An address bar spoofing issue was discovered. > > CVE-2016-5156 > > jinmo123 discovered a use-after-free issue. > > CVE-2016-5157 > > A heap overflow issue was discovered in the pdfium library. > > CVE-2016-5158 > > GiWan Go discovered a heap overflow issue in the pdfium library. > > CVE-2016-5159 > > GiWan Go discovered another heap overflow issue in the pdfium library. > > CVE-2016-5160 > > @l33terally discovered an extensions resource bypass. > > CVE-2016-5161 > > A type confusion issue was discovered. > > CVE-2016-5162 > > Nicolas Golubovic discovered an extensions resource bypass. > > CVE-2016-5163 > > Rafay Baloch discovered an address bar spoofing issue. > > CVE-2016-5164 > > A cross-site scripting issue was discovered in the developer tools. > > CVE-2016-5165 > > Gregory Panakkal discovered a script injection issue in the developer > tools. > > CVE-2016-5166 > > Gregory Panakkal discovered an issue with the Save Page As feature. > > CVE-2016-5167 > > The chrome development team found and fixed various issues during > internal auditing. > > For the stable distribution (jessie), these problems have been fixed in > version 53.0.2785.89-1~deb8u1. > > For the testing distribution (stretch), these problems will be fixed soon. > > For the unstable distribution (sid), these problems have been fixed in > version 53.0.2785.89-1. > > We recommend that you upgrade your chromium-browser packages. > > Further information about Debian Security Advisories, how to apply > these updates to your system and frequently asked questions can be > found at: https://www.debian.org/security/ > > Mailing list: debian-security-annou...@lists.debian.org > -----BEGIN PGP SIGNATURE----- > > iQQcBAEBCgAGBQJXzfxvAAoJELjWss0C1vRzsWsf/39O4Lp8x7NvFPabS/QiPKOh > nBgUQJ4lfHlAWqk99LDl+Zg4DivcCppsKMb729K2Eu8OtnVoZCSkGjlQ1okSfkj3 > qkIpK2tgvap3dCL6R/IKed2+shoCmG1Usu+PUHX13xYuo8itG9lDhdsyYlTv5A2p > Sa3StWkeBBWpHAsKpA8kKmKYm09w75ZCrR7OMdNWFTpUaVyDzRJfjb3VJ6y1gBPU > QzyQrbr0bB7L5b0sIy90mu9LvJnb/pfQ47crrCLMQmuuwxo2oYaCB4jwqXAaeNgN > fbZvlyNZCSNUhmVVsW4roo6zLhRulosHYb3W17TdboQt862RPSvZNicDaRi5PNyY > aBjfR3IKr/8ytSlLTyht1lxf7V8yR1Y1G95aRlt34vdjmDOQJKbMLkNEhryA2THK > GljtDhgIUh6z8/8v7OpUJ1XCTLtik8K/RtRMUIRjnn2cqJuuv1ip1VJLqxiVL7w1 > VWI9SlKVXpfGPG56lakBvoIxPPkuFaue1bZJchCNijPC/SE8DcwUe+Xk9pWX83KZ > jIfj51jRdDkPiJUUAahriupXt0qD6xv9HzQS+F9kASwHixBsgg4PT1F4AIsB7ODz > 5T2hq/DYwD69vUtA23lipw8z3+zN1pdRnKEoPP+GKlUiVZl9vBuLsFIFt48IW/vk > n1wg0AdxQfqZwu3uPhqVHMDAG1zVtmT82zAzTtaSAUmDvmcYHX3gdj7Lyw+4cCF6 > 1TYhZq90cjT+kDskIxdJv6BBRVndIaV3tV4gYDg/Jq/8repUDbX+9z/efzjEZzYq > EeU/7dAbB+KSeuoPVG3bWWS6Qj+J+3Ww2Q6z3hD/dHhZxOP0tJ9y/7SZ0gVSTSGW > /B3Z2uVb27zBWX1LpbzSnLtwHLe+qcXyKIKfH6izBKRSdMQWX029OZUsYFxv9ciK > m1iDxd1Ng41bGM657FH9oh5122eXEY+ZmOIyDvVaTBUPokFRzab3ZCdCBqH+WUi/ > vO9FAxD7IE9Co7zh8bB4LnmCGXpWLSz5wdMs756KYEPaaF8B3j/4Q2GWmSOXmEpL > jXarAajAHR23GwjGtS+CeJiPQrDYnJ6AaORab6MXCMee/J5b02Si2zCfcjZM6nZW > 6eW70jAyJoe/LInMjaR3HkpZKaU30ZWfjt0ul1bvnKwQxm2CfDZYmxvtk3XaBYLn > ZkqBz0d3l8vcHX9hBiIfpAUG6cFaXAqkJz21oVLCCrpHPhW7AiAkE/AlSXFNXeVc > 9FwgDR98OqZiV63DHpGx+3Z1/GzHf3KSX5tL/e+xHQz7n6jJuw/pxlkwaOWbqEmj > d22Tq+45Ho9JlKBUaSAkCJYQLoxyFrq9fUI1OJJCHWra7yeY4MkPBKaQCb38QXw= > =Igvd > -----END PGP SIGNATURE----- >