Commit 952f5015 authored by Sangdo Jun's avatar Sangdo Jun

Chromium

CVS version numbers

korean/security/2018/dsa-4103.wml: INITIAL -> 1.1
parent 76807672
#use wml::debian::translation-check translation="1.4" maintainer="Sebul"
<define-tag description>보안 업데이트</define-tag>
<define-tag moreinfo>
<p>여러 보안취약점이 크로미엄 웹 브라우저에서 발견되었습니다.
</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15420">CVE-2017-15420</a>
<p>Drew Springall 이 URL spoofing 문제를 발견했습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-15429">CVE-2017-15429</a>
<p>cross-site 스크립팅 문제가 v8 javascript
라이브러리에서 발견되었습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6031">CVE-2018-6031</a>
<p>use-after-free 문제가 pdfium 라이브러리에서 발견되었습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6032">CVE-2018-6032</a>
<p>Jun Kokatsu 가 같은 근원 정책을 우회하는 길을 발견했습니다</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6033">CVE-2018-6033</a>
<p>Juho Nurminen 이 내려받은 파일들을 열 때 경쟁조건을 발견했습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6034">CVE-2018-6034</a>
<p>Tobias Klein 이 정수 오버플로우 문제를 발견했습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6035">CVE-2018-6035</a>
<p>Rob Wu 가 devtools 에 액세스하는 확장 방법을 발견했습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6036">CVE-2018-6036</a>
<p>UK's National Cyber Security Centre 는 정수 오버플로 문제를 발견했습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6037">CVE-2018-6037</a>
<p>Paul Stone 은 autofill feature 문제를 발견했습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6038">CVE-2018-6038</a>
<p>cloudfuzzer 는 버퍼 오버플로 문제를 발견했습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6039">CVE-2018-6039</a>
<p>Juho Nurminen 는 개발 도구에서 cross-site 스크립팅 문제를 발견했습니다.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6040">CVE-2018-6040</a>
<p>WenXu Wu discovered a way to bypass the content security policy.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6041">CVE-2018-6041</a>
<p>Luan Herrera discovered a URL spoofing issue.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6042">CVE-2018-6042</a>
<p>Khalil Zhani discovered a URL spoofing issue.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6043">CVE-2018-6043</a>
<p>A character escaping issue was discovered.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6045">CVE-2018-6045</a>
<p>Rob Wu discovered a way for extensions to access devtools.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6046">CVE-2018-6046</a>
<p>Rob Wu discovered a way for extensions to access devtools.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6047">CVE-2018-6047</a>
<p>Masato Kinugawa discovered an information leak issue.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6048">CVE-2018-6048</a>
<p>Jun Kokatsu discovered a way to bypass the referrer policy.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6049">CVE-2018-6049</a>
<p>WenXu Wu discovered a user interface spoofing issue.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6050">CVE-2018-6050</a>
<p>Jonathan Kew discovered a URL spoofing issue.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6051">CVE-2018-6051</a>
<p>Antonio Sanso discovered an information leak issue.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6052">CVE-2018-6052</a>
<p>Tanner Emek discovered that the referrer policy implementation
was incomplete.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6053">CVE-2018-6053</a>
<p>Asset Kabdenov discovered an information leak issue.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-6054">CVE-2018-6054</a>
<p>Rob Wu discovered a use-after-free issue.</p></li>
</ul>
<p>옛 안정 버전(jessie)에서, 크로미엄에 대한 보안 지원은 끊겼습니다.</p>
<p>안정 버전(stretch)에서 , 이 문제는 버전 64.0.3282.119-1~deb9u1 에서 고쳐졌습니다.</p>
<p>chromium-browser 패키지를 업그레이드할 것을 권합니다.</p>
<p>크로미엄 브라우저의 자세한 보안 상태는 다음 보안 추적 페이지를 보세요:
<a href="https://security-tracker.debian.org/tracker/chromium-browser">\
https://security-tracker.debian.org/tracker/chromium-browser</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/security/2018/dsa-4103.data"
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment