openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2055-1
Rating: important
References: #1178923
Cross-References: CVE-2019-8075 CVE-2020-16012 CVE-2020-16014
CVE-2020-16015 CVE-2020-16018 CVE-2020-16019
CVE-2020-16020 CVE-2020-16021 CVE-2020-16022
CVE-2020-16023 CVE-2020-16024 CVE-2020-16025
CVE-2020-16026 CVE-2020-16027 CVE-2020-16028
CVE-2020-16029 CVE-2020-16030 CVE-2020-16031
CVE-2020-16032 CVE-2020-16033 CVE-2020-16034
CVE-2020-16035 CVE-2020-16036
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes 23 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
– Update to 87.0.4280.66 (boo#1178923)
– Wayland support by default
– CVE-2020-16018: Use after free in payments.
– CVE-2020-16019: Inappropriate implementation in filesystem.
– CVE-2020-16020: Inappropriate implementation in cryptohome.
– CVE-2020-16021: Race in ImageBurner.
– CVE-2020-16022: Insufficient policy enforcement in networking.
– CVE-2020-16015: Insufficient data validation in WASM. R
– CVE-2020-16014: Use after free in PPAPI.
– CVE-2020-16023: Use after free in WebCodecs.
– CVE-2020-16024: Heap buffer overflow in UI.
– CVE-2020-16025: Heap buffer overflow in clipboard.
– CVE-2020-16026: Use after free in WebRTC.
– CVE-2020-16027: Insufficient policy enforcement in developer tools. R
– CVE-2020-16028: Heap buffer overflow in WebRTC.
– CVE-2020-16029: Inappropriate implementation in PDFium.
– CVE-2020-16030: Insufficient data validation in Blink.
– CVE-2019-8075: Insufficient data validation in Flash.
– CVE-2020-16031: Incorrect security UI in tab preview.
– CVE-2020-16032: Incorrect security UI in sharing.
– CVE-2020-16033: Incorrect security UI in WebUSB.
– CVE-2020-16034: Inappropriate implementation in WebRTC.
– CVE-2020-16035: Insufficient data validation in cros-disks.
– CVE-2020-16012: Side-channel information leakage in graphics.
– CVE-2020-16036: Inappropriate implementation in cookies.
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-2055=1
Package List:
– openSUSE Backports SLE-15-SP1 (aarch64 x86_64):
chromedriver-87.0.4280.66-bp151.3.137.1
chromium-87.0.4280.66-bp151.3.137.1
References:
https://www.suse.com/security/cve/CVE-2019-8075.html
https://www.suse.com/security/cve/CVE-2020-16012.html
https://www.suse.com/security/cve/CVE-2020-16014.html
https://www.suse.com/security/cve/CVE-2020-16015.html
https://www.suse.com/security/cve/CVE-2020-16018.html
https://www.suse.com/security/cve/CVE-2020-16019.html
https://www.suse.com/security/cve/CVE-2020-16020.html
https://www.suse.com/security/cve/CVE-2020-16021.html
https://www.suse.com/security/cve/CVE-2020-16022.html
https://www.suse.com/security/cve/CVE-2020-16023.html
https://www.suse.com/security/cve/CVE-2020-16024.html
https://www.suse.com/security/cve/CVE-2020-16025.html
https://www.suse.com/security/cve/CVE-2020-16026.html
https://www.suse.com/security/cve/CVE-2020-16027.html
https://www.suse.com/security/cve/CVE-2020-16028.html
https://www.suse.com/security/cve/CVE-2020-16029.html
https://www.suse.com/security/cve/CVE-2020-16030.html
https://www.suse.com/security/cve/CVE-2020-16031.html
https://www.suse.com/security/cve/CVE-2020-16032.html
https://www.suse.com/security/cve/CVE-2020-16033.html
https://www.suse.com/security/cve/CVE-2020-16034.html
https://www.suse.com/security/cve/CVE-2020-16035.html
https://www.suse.com/security/cve/CVE-2020-16036.html
https://bugzilla.suse.com/1178923
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2032-1
Rating: important
References: #1178923
Cross-References: CVE-2019-8075 CVE-2020-16012 CVE-2020-16014
CVE-2020-16015 CVE-2020-16018 CVE-2020-16019
CVE-2020-16020 CVE-2020-16021 CVE-2020-16022
CVE-2020-16023 CVE-2020-16024 CVE-2020-16025
CVE-2020-16026 CVE-2020-16027 CVE-2020-16028
CVE-2020-16029 CVE-2020-16030 CVE-2020-16031
CVE-2020-16032 CVE-2020-16033 CVE-2020-16034
CVE-2020-16035 CVE-2020-16036
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes 23 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
– Update to 87.0.4280.66 (boo#1178923)
– Wayland support by default
– CVE-2020-16018: Use after free in payments.
– CVE-2020-16019: Inappropriate implementation in filesystem.
– CVE-2020-16020: Inappropriate implementation in cryptohome.
– CVE-2020-16021: Race in ImageBurner.
– CVE-2020-16022: Insufficient policy enforcement in networking.
– CVE-2020-16015: Insufficient data validation in WASM. R
– CVE-2020-16014: Use after free in PPAPI.
– CVE-2020-16023: Use after free in WebCodecs.
– CVE-2020-16024: Heap buffer overflow in UI.
– CVE-2020-16025: Heap buffer overflow in clipboard.
– CVE-2020-16026: Use after free in WebRTC.
– CVE-2020-16027: Insufficient policy enforcement in developer tools. R
– CVE-2020-16028: Heap buffer overflow in WebRTC.
– CVE-2020-16029: Inappropriate implementation in PDFium.
– CVE-2020-16030: Insufficient data validation in Blink.
– CVE-2019-8075: Insufficient data validation in Flash.
– CVE-2020-16031: Incorrect security UI in tab preview.
– CVE-2020-16032: Incorrect security UI in sharing.
– CVE-2020-16033: Incorrect security UI in WebUSB.
– CVE-2020-16034: Inappropriate implementation in WebRTC.
– CVE-2020-16035: Insufficient data validation in cros-disks.
– CVE-2020-16012: Side-channel information leakage in graphics.
– CVE-2020-16036: Inappropriate implementation in cookies.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-2032=1
Package List:
– openSUSE Leap 15.1 (x86_64):
chromedriver-87.0.4280.66-lp151.2.156.1
chromedriver-debuginfo-87.0.4280.66-lp151.2.156.1
chromium-87.0.4280.66-lp151.2.156.1
chromium-debuginfo-87.0.4280.66-lp151.2.156.1
References:
https://www.suse.com/security/cve/CVE-2019-8075.html
https://www.suse.com/security/cve/CVE-2020-16012.html
https://www.suse.com/security/cve/CVE-2020-16014.html
https://www.suse.com/security/cve/CVE-2020-16015.html
https://www.suse.com/security/cve/CVE-2020-16018.html
https://www.suse.com/security/cve/CVE-2020-16019.html
https://www.suse.com/security/cve/CVE-2020-16020.html
https://www.suse.com/security/cve/CVE-2020-16021.html
https://www.suse.com/security/cve/CVE-2020-16022.html
https://www.suse.com/security/cve/CVE-2020-16023.html
https://www.suse.com/security/cve/CVE-2020-16024.html
https://www.suse.com/security/cve/CVE-2020-16025.html
https://www.suse.com/security/cve/CVE-2020-16026.html
https://www.suse.com/security/cve/CVE-2020-16027.html
https://www.suse.com/security/cve/CVE-2020-16028.html
https://www.suse.com/security/cve/CVE-2020-16029.html
https://www.suse.com/security/cve/CVE-2020-16030.html
https://www.suse.com/security/cve/CVE-2020-16031.html
https://www.suse.com/security/cve/CVE-2020-16032.html
https://www.suse.com/security/cve/CVE-2020-16033.html
https://www.suse.com/security/cve/CVE-2020-16034.html
https://www.suse.com/security/cve/CVE-2020-16035.html
https://www.suse.com/security/cve/CVE-2020-16036.html
https://bugzilla.suse.com/1178923
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2026-1
Rating: important
References: #1178923
Cross-References: CVE-2019-8075 CVE-2020-16012 CVE-2020-16014
CVE-2020-16015 CVE-2020-16018 CVE-2020-16019
CVE-2020-16020 CVE-2020-16021 CVE-2020-16022
CVE-2020-16023 CVE-2020-16024 CVE-2020-16025
CVE-2020-16026 CVE-2020-16027 CVE-2020-16028
CVE-2020-16029 CVE-2020-16030 CVE-2020-16031
CVE-2020-16032 CVE-2020-16033 CVE-2020-16034
CVE-2020-16035 CVE-2020-16036
Affected Products:
openSUSE Backports SLE-15-SP2
______________________________________________________________________________
An update that fixes 23 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
– Update to 87.0.4280.66 (boo#1178923)
– Wayland support by default
– CVE-2020-16018: Use after free in payments.
– CVE-2020-16019: Inappropriate implementation in filesystem.
– CVE-2020-16020: Inappropriate implementation in cryptohome.
– CVE-2020-16021: Race in ImageBurner.
– CVE-2020-16022: Insufficient policy enforcement in networking.
– CVE-2020-16015: Insufficient data validation in WASM. R
– CVE-2020-16014: Use after free in PPAPI.
– CVE-2020-16023: Use after free in WebCodecs.
– CVE-2020-16024: Heap buffer overflow in UI.
– CVE-2020-16025: Heap buffer overflow in clipboard.
– CVE-2020-16026: Use after free in WebRTC.
– CVE-2020-16027: Insufficient policy enforcement in developer tools. R
– CVE-2020-16028: Heap buffer overflow in WebRTC.
– CVE-2020-16029: Inappropriate implementation in PDFium.
– CVE-2020-16030: Insufficient data validation in Blink.
– CVE-2019-8075: Insufficient data validation in Flash.
– CVE-2020-16031: Incorrect security UI in tab preview.
– CVE-2020-16032: Incorrect security UI in sharing.
– CVE-2020-16033: Incorrect security UI in WebUSB.
– CVE-2020-16034: Inappropriate implementation in WebRTC.
– CVE-2020-16035: Insufficient data validation in cros-disks.
– CVE-2020-16012: Side-channel information leakage in graphics.
– CVE-2020-16036: Inappropriate implementation in cookies.
This update was imported from the openSUSE:Leap:15.2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2020-2026=1
Package List:
– openSUSE Backports SLE-15-SP2 (aarch64 x86_64):
chromedriver-87.0.4280.66-bp152.2.38.1
chromium-87.0.4280.66-bp152.2.38.1
References:
https://www.suse.com/security/cve/CVE-2019-8075.html
https://www.suse.com/security/cve/CVE-2020-16012.html
https://www.suse.com/security/cve/CVE-2020-16014.html
https://www.suse.com/security/cve/CVE-2020-16015.html
https://www.suse.com/security/cve/CVE-2020-16018.html
https://www.suse.com/security/cve/CVE-2020-16019.html
https://www.suse.com/security/cve/CVE-2020-16020.html
https://www.suse.com/security/cve/CVE-2020-16021.html
https://www.suse.com/security/cve/CVE-2020-16022.html
https://www.suse.com/security/cve/CVE-2020-16023.html
https://www.suse.com/security/cve/CVE-2020-16024.html
https://www.suse.com/security/cve/CVE-2020-16025.html
https://www.suse.com/security/cve/CVE-2020-16026.html
https://www.suse.com/security/cve/CVE-2020-16027.html
https://www.suse.com/security/cve/CVE-2020-16028.html
https://www.suse.com/security/cve/CVE-2020-16029.html
https://www.suse.com/security/cve/CVE-2020-16030.html
https://www.suse.com/security/cve/CVE-2020-16031.html
https://www.suse.com/security/cve/CVE-2020-16032.html
https://www.suse.com/security/cve/CVE-2020-16033.html
https://www.suse.com/security/cve/CVE-2020-16034.html
https://www.suse.com/security/cve/CVE-2020-16035.html
https://www.suse.com/security/cve/CVE-2020-16036.html
https://bugzilla.suse.com/1178923
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2021-1
Rating: important
References: #1178923
Cross-References: CVE-2019-8075 CVE-2020-16012 CVE-2020-16014
CVE-2020-16015 CVE-2020-16018 CVE-2020-16019
CVE-2020-16020 CVE-2020-16021 CVE-2020-16022
CVE-2020-16023 CVE-2020-16024 CVE-2020-16025
CVE-2020-16026 CVE-2020-16027 CVE-2020-16028
CVE-2020-16029 CVE-2020-16030 CVE-2020-16031
CVE-2020-16032 CVE-2020-16033 CVE-2020-16034
CVE-2020-16035 CVE-2020-16036
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes 23 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
– Update to 87.0.4280.66 (boo#1178923)
– Wayland support by default
– CVE-2020-16018: Use after free in payments.
– CVE-2020-16019: Inappropriate implementation in filesystem.
– CVE-2020-16020: Inappropriate implementation in cryptohome.
– CVE-2020-16021: Race in ImageBurner.
– CVE-2020-16022: Insufficient policy enforcement in networking.
– CVE-2020-16015: Insufficient data validation in WASM. R
– CVE-2020-16014: Use after free in PPAPI.
– CVE-2020-16023: Use after free in WebCodecs.
– CVE-2020-16024: Heap buffer overflow in UI.
– CVE-2020-16025: Heap buffer overflow in clipboard.
– CVE-2020-16026: Use after free in WebRTC.
– CVE-2020-16027: Insufficient policy enforcement in developer tools. R
– CVE-2020-16028: Heap buffer overflow in WebRTC.
– CVE-2020-16029: Inappropriate implementation in PDFium.
– CVE-2020-16030: Insufficient data validation in Blink.
– CVE-2019-8075: Insufficient data validation in Flash.
– CVE-2020-16031: Incorrect security UI in tab preview.
– CVE-2020-16032: Incorrect security UI in sharing.
– CVE-2020-16033: Incorrect security UI in WebUSB.
– CVE-2020-16034: Inappropriate implementation in WebRTC.
– CVE-2020-16035: Insufficient data validation in cros-disks.
– CVE-2020-16012: Side-channel information leakage in graphics.
– CVE-2020-16036: Inappropriate implementation in cookies.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.2:
zypper in -t patch openSUSE-2020-2021=1
Package List:
– openSUSE Leap 15.2 (x86_64):
chromedriver-87.0.4280.66-lp152.2.51.1
chromedriver-debuginfo-87.0.4280.66-lp152.2.51.1
chromium-87.0.4280.66-lp152.2.51.1
chromium-debuginfo-87.0.4280.66-lp152.2.51.1
References:
https://www.suse.com/security/cve/CVE-2019-8075.html
https://www.suse.com/security/cve/CVE-2020-16012.html
https://www.suse.com/security/cve/CVE-2020-16014.html
https://www.suse.com/security/cve/CVE-2020-16015.html
https://www.suse.com/security/cve/CVE-2020-16018.html
https://www.suse.com/security/cve/CVE-2020-16019.html
https://www.suse.com/security/cve/CVE-2020-16020.html
https://www.suse.com/security/cve/CVE-2020-16021.html
https://www.suse.com/security/cve/CVE-2020-16022.html
https://www.suse.com/security/cve/CVE-2020-16023.html
https://www.suse.com/security/cve/CVE-2020-16024.html
https://www.suse.com/security/cve/CVE-2020-16025.html
https://www.suse.com/security/cve/CVE-2020-16026.html
https://www.suse.com/security/cve/CVE-2020-16027.html
https://www.suse.com/security/cve/CVE-2020-16028.html
https://www.suse.com/security/cve/CVE-2020-16029.html
https://www.suse.com/security/cve/CVE-2020-16030.html
https://www.suse.com/security/cve/CVE-2020-16031.html
https://www.suse.com/security/cve/CVE-2020-16032.html
https://www.suse.com/security/cve/CVE-2020-16033.html
https://www.suse.com/security/cve/CVE-2020-16034.html
https://www.suse.com/security/cve/CVE-2020-16035.html
https://www.suse.com/security/cve/CVE-2020-16036.html
https://bugzilla.suse.com/1178923
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2016-1
Rating: important
References: #1178630 #1178703
Cross-References: CVE-2020-16013 CVE-2020-16016 CVE-2020-16017
Affected Products:
openSUSE Backports SLE-15-SP2
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Update to 86.0.4240.198 (boo#1178703)
– CVE-2020-16013: Inappropriate implementation in V8
– CVE-2020-16017: Use after free in site isolation
Update to 86.0.4240.193 (boo#1178630)
– CVE-2020-16016: Inappropriate implementation in base.
This update was imported from the openSUSE:Leap:15.2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2020-2016=1
Package List:
– openSUSE Backports SLE-15-SP2 (aarch64 x86_64):
chromedriver-86.0.4240.198-bp152.2.35.1
chromium-86.0.4240.198-bp152.2.35.1
References:
https://www.suse.com/security/cve/CVE-2020-16013.html
https://www.suse.com/security/cve/CVE-2020-16016.html
https://www.suse.com/security/cve/CVE-2020-16017.html
https://bugzilla.suse.com/1178630
https://bugzilla.suse.com/1178703
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2013-1
Rating: important
References: #1178630 #1178703
Cross-References: CVE-2020-16013 CVE-2020-16016 CVE-2020-16017
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Update to 86.0.4240.198 (boo#1178703)
– CVE-2020-16013: Inappropriate implementation in V8
– CVE-2020-16017: Use after free in site isolation
Update to 86.0.4240.193 (boo#1178630)
– CVE-2020-16016: Inappropriate implementation in base.
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-2013=1
Package List:
– openSUSE Backports SLE-15-SP1 (aarch64 x86_64):
chromedriver-86.0.4240.198-bp151.3.134.1
chromium-86.0.4240.198-bp151.3.134.1
References:
https://www.suse.com/security/cve/CVE-2020-16013.html
https://www.suse.com/security/cve/CVE-2020-16016.html
https://www.suse.com/security/cve/CVE-2020-16017.html
https://bugzilla.suse.com/1178630
https://bugzilla.suse.com/1178703
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2012-1
Rating: important
References: #1178923
Cross-References: CVE-2019-8075 CVE-2020-16012 CVE-2020-16014
CVE-2020-16015 CVE-2020-16018 CVE-2020-16019
CVE-2020-16020 CVE-2020-16021 CVE-2020-16022
CVE-2020-16023 CVE-2020-16024 CVE-2020-16025
CVE-2020-16026 CVE-2020-16027 CVE-2020-16028
CVE-2020-16029 CVE-2020-16030 CVE-2020-16031
CVE-2020-16032 CVE-2020-16033 CVE-2020-16034
CVE-2020-16035 CVE-2020-16036
Affected Products:
openSUSE Backports SLE-15-SP2
______________________________________________________________________________
An update that fixes 23 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
– Update to 87.0.4280.66 (boo#1178923)
– Wayland support by default
– CVE-2020-16018: Use after free in payments.
– CVE-2020-16019: Inappropriate implementation in filesystem.
– CVE-2020-16020: Inappropriate implementation in cryptohome.
– CVE-2020-16021: Race in ImageBurner.
– CVE-2020-16022: Insufficient policy enforcement in networking.
– CVE-2020-16015: Insufficient data validation in WASM. R
– CVE-2020-16014: Use after free in PPAPI.
– CVE-2020-16023: Use after free in WebCodecs.
– CVE-2020-16024: Heap buffer overflow in UI.
– CVE-2020-16025: Heap buffer overflow in clipboard.
– CVE-2020-16026: Use after free in WebRTC.
– CVE-2020-16027: Insufficient policy enforcement in developer tools. R
– CVE-2020-16028: Heap buffer overflow in WebRTC.
– CVE-2020-16029: Inappropriate implementation in PDFium.
– CVE-2020-16030: Insufficient data validation in Blink.
– CVE-2019-8075: Insufficient data validation in Flash.
– CVE-2020-16031: Incorrect security UI in tab preview.
– CVE-2020-16032: Incorrect security UI in sharing.
– CVE-2020-16033: Incorrect security UI in WebUSB.
– CVE-2020-16034: Inappropriate implementation in WebRTC.
– CVE-2020-16035: Insufficient data validation in cros-disks.
– CVE-2020-16012: Side-channel information leakage in graphics.
– CVE-2020-16036: Inappropriate implementation in cookies.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2020-2012=1
Package List:
– openSUSE Backports SLE-15-SP2 (aarch64 x86_64):
chromedriver-87.0.4280.66-bp152.2.32.1
chromium-87.0.4280.66-bp152.2.32.1
References:
https://www.suse.com/security/cve/CVE-2019-8075.html
https://www.suse.com/security/cve/CVE-2020-16012.html
https://www.suse.com/security/cve/CVE-2020-16014.html
https://www.suse.com/security/cve/CVE-2020-16015.html
https://www.suse.com/security/cve/CVE-2020-16018.html
https://www.suse.com/security/cve/CVE-2020-16019.html
https://www.suse.com/security/cve/CVE-2020-16020.html
https://www.suse.com/security/cve/CVE-2020-16021.html
https://www.suse.com/security/cve/CVE-2020-16022.html
https://www.suse.com/security/cve/CVE-2020-16023.html
https://www.suse.com/security/cve/CVE-2020-16024.html
https://www.suse.com/security/cve/CVE-2020-16025.html
https://www.suse.com/security/cve/CVE-2020-16026.html
https://www.suse.com/security/cve/CVE-2020-16027.html
https://www.suse.com/security/cve/CVE-2020-16028.html
https://www.suse.com/security/cve/CVE-2020-16029.html
https://www.suse.com/security/cve/CVE-2020-16030.html
https://www.suse.com/security/cve/CVE-2020-16031.html
https://www.suse.com/security/cve/CVE-2020-16032.html
https://www.suse.com/security/cve/CVE-2020-16033.html
https://www.suse.com/security/cve/CVE-2020-16034.html
https://www.suse.com/security/cve/CVE-2020-16035.html
https://www.suse.com/security/cve/CVE-2020-16036.html
https://bugzilla.suse.com/1178923
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2010-1
Rating: important
References: #1178923
Cross-References: CVE-2019-8075 CVE-2020-16012 CVE-2020-16014
CVE-2020-16015 CVE-2020-16018 CVE-2020-16019
CVE-2020-16020 CVE-2020-16021 CVE-2020-16022
CVE-2020-16023 CVE-2020-16024 CVE-2020-16025
CVE-2020-16026 CVE-2020-16027 CVE-2020-16028
CVE-2020-16029 CVE-2020-16030 CVE-2020-16031
CVE-2020-16032 CVE-2020-16033 CVE-2020-16034
CVE-2020-16035 CVE-2020-16036
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes 23 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
– Update to 87.0.4280.66 (boo#1178923)
– Wayland support by default
– CVE-2020-16018: Use after free in payments.
– CVE-2020-16019: Inappropriate implementation in filesystem.
– CVE-2020-16020: Inappropriate implementation in cryptohome.
– CVE-2020-16021: Race in ImageBurner.
– CVE-2020-16022: Insufficient policy enforcement in networking.
– CVE-2020-16015: Insufficient data validation in WASM. R
– CVE-2020-16014: Use after free in PPAPI.
– CVE-2020-16023: Use after free in WebCodecs.
– CVE-2020-16024: Heap buffer overflow in UI.
– CVE-2020-16025: Heap buffer overflow in clipboard.
– CVE-2020-16026: Use after free in WebRTC.
– CVE-2020-16027: Insufficient policy enforcement in developer tools. R
– CVE-2020-16028: Heap buffer overflow in WebRTC.
– CVE-2020-16029: Inappropriate implementation in PDFium.
– CVE-2020-16030: Insufficient data validation in Blink.
– CVE-2019-8075: Insufficient data validation in Flash.
– CVE-2020-16031: Incorrect security UI in tab preview.
– CVE-2020-16032: Incorrect security UI in sharing.
– CVE-2020-16033: Incorrect security UI in WebUSB.
– CVE-2020-16034: Inappropriate implementation in WebRTC.
– CVE-2020-16035: Insufficient data validation in cros-disks.
– CVE-2020-16012: Side-channel information leakage in graphics.
– CVE-2020-16036: Inappropriate implementation in cookies.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-2010=1
Package List:
– openSUSE Backports SLE-15-SP1 (aarch64 x86_64):
chromedriver-87.0.4280.66-bp151.3.131.1
chromium-87.0.4280.66-bp151.3.131.1
References:
https://www.suse.com/security/cve/CVE-2019-8075.html
https://www.suse.com/security/cve/CVE-2020-16012.html
https://www.suse.com/security/cve/CVE-2020-16014.html
https://www.suse.com/security/cve/CVE-2020-16015.html
https://www.suse.com/security/cve/CVE-2020-16018.html
https://www.suse.com/security/cve/CVE-2020-16019.html
https://www.suse.com/security/cve/CVE-2020-16020.html
https://www.suse.com/security/cve/CVE-2020-16021.html
https://www.suse.com/security/cve/CVE-2020-16022.html
https://www.suse.com/security/cve/CVE-2020-16023.html
https://www.suse.com/security/cve/CVE-2020-16024.html
https://www.suse.com/security/cve/CVE-2020-16025.html
https://www.suse.com/security/cve/CVE-2020-16026.html
https://www.suse.com/security/cve/CVE-2020-16027.html
https://www.suse.com/security/cve/CVE-2020-16028.html
https://www.suse.com/security/cve/CVE-2020-16029.html
https://www.suse.com/security/cve/CVE-2020-16030.html
https://www.suse.com/security/cve/CVE-2020-16031.html
https://www.suse.com/security/cve/CVE-2020-16032.html
https://www.suse.com/security/cve/CVE-2020-16033.html
https://www.suse.com/security/cve/CVE-2020-16034.html
https://www.suse.com/security/cve/CVE-2020-16035.html
https://www.suse.com/security/cve/CVE-2020-16036.html
https://bugzilla.suse.com/1178923
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org