openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:1831-1
Rating: important
References: #1178375
Cross-References: CVE-2020-16004 CVE-2020-16005 CVE-2020-16006
CVE-2020-16007 CVE-2020-16008 CVE-2020-16009
CVE-2020-16011
Affected Products:
openSUSE Leap 15.2
openSUSE Leap 15.1
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
– Update to 86.0.4240.183 boo#1178375
– CVE-2020-16004: Use after free in user interface.
– CVE-2020-16005: Insufficient policy enforcement in ANGLE.
– CVE-2020-16006: Inappropriate implementation in V8
– CVE-2020-16007: Insufficient data validation in installer.
– CVE-2020-16008: Stack buffer overflow in WebRTC.
– CVE-2020-16009: Inappropriate implementation in V8.
– CVE-2020-16011: Heap buffer overflow in UI on Windows.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.2:
zypper in -t patch openSUSE-2020-1831=1
– openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-1831=1
– openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-1831=1
Package List:
– openSUSE Leap 15.2 (x86_64):
chromedriver-86.0.4240.183-lp152.2.45.1
chromedriver-debuginfo-86.0.4240.183-lp152.2.45.1
chromium-86.0.4240.183-lp152.2.45.1
chromium-debuginfo-86.0.4240.183-lp152.2.45.1
– openSUSE Leap 15.1 (x86_64):
chromedriver-86.0.4240.183-lp151.2.150.1
chromedriver-debuginfo-86.0.4240.183-lp151.2.150.1
chromium-86.0.4240.183-lp151.2.150.1
chromium-debuginfo-86.0.4240.183-lp151.2.150.1
– openSUSE Backports SLE-15-SP1 (aarch64 x86_64):
chromedriver-86.0.4240.183-bp151.3.119.1
chromium-86.0.4240.183-bp151.3.119.1
References:
https://protect2.fireeye.com/v1/url?k=f8142445-a7883e5b-f813b989-000babd90757-eaa099a92d48beb9&q=1&e=749e4c81-fdac-4420-bb2b-8f22bf9fc9b5&u=https%3A%2F%2Fwww.suse.com%2Fsecurity%2Fcve%2FCVE-2020-16004.html
https://protect2.fireeye.com/v1/url?k=01f5c6de-5e69dcc0-01f25b12-000babd90757-927875aac14740ae&q=1&e=749e4c81-fdac-4420-bb2b-8f22bf9fc9b5&u=https%3A%2F%2Fwww.suse.com%2Fsecurity%2Fcve%2FCVE-2020-16005.html
https://protect2.fireeye.com/v1/url?k=d8b3cf5c-872fd542-d8b45290-000babd90757-3f54c49933998562&q=1&e=749e4c81-fdac-4420-bb2b-8f22bf9fc9b5&u=https%3A%2F%2Fwww.suse.com%2Fsecurity%2Fcve%2FCVE-2020-16006.html
https://protect2.fireeye.com/v1/url?k=8748a47d-d8d4be63-874f39b1-000babd90757-0f5f7f6901043fa9&q=1&e=749e4c81-fdac-4420-bb2b-8f22bf9fc9b5&u=https%3A%2F%2Fwww.suse.com%2Fsecurity%2Fcve%2FCVE-2020-16007.html
https://protect2.fireeye.com/v1/url?k=f5b4c255-aa28d84b-f5b35f99-000babd90757-3d607b007ac3e5f0&q=1&e=749e4c81-fdac-4420-bb2b-8f22bf9fc9b5&u=https%3A%2F%2Fwww.suse.com%2Fsecurity%2Fcve%2FCVE-2020-16008.html
https://protect2.fireeye.com/v1/url?k=59218b55-06bd914b-59261699-000babd90757-70ddc9678b7f221d&q=1&e=749e4c81-fdac-4420-bb2b-8f22bf9fc9b5&u=https%3A%2F%2Fwww.suse.com%2Fsecurity%2Fcve%2FCVE-2020-16009.html
https://protect2.fireeye.com/v1/url?k=2b82f583-741eef9d-2b85684f-000babd90757-3d4d58e627019193&q=1&e=749e4c81-fdac-4420-bb2b-8f22bf9fc9b5&u=https%3A%2F%2Fwww.suse.com%2Fsecurity%2Fcve%2FCVE-2020-16011.html
https://protect2.fireeye.com/v1/url?k=ed9f4150-b2035b4e-ed98dc9c-000babd90757-8c130e860256ea5d&q=1&e=749e4c81-fdac-4420-bb2b-8f22bf9fc9b5&u=https%3A%2F%2Fbugzilla.suse.com%2F1178375
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org