openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1869-1
Rating: important
References: #989901
Cross-References: CVE-2016-1705 CVE-2016-1706 CVE-2016-1707
CVE-2016-1708 CVE-2016-1709 CVE-2016-1710
CVE-2016-1711 CVE-2016-5127 CVE-2016-5128
CVE-2016-5129 CVE-2016-5130 CVE-2016-5131
CVE-2016-5132 CVE-2016-5133 CVE-2016-5134
CVE-2016-5135 CVE-2016-5136 CVE-2016-5137
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes 18 vulnerabilities is now available.
Description:
Chromium was updated to 52.0.2743.82 to fix the following security issues
(boo#989901):
– CVE-2016-1706: Sandbox escape in PPAPI
– CVE-2016-1707: URL spoofing on iOS
– CVE-2016-1708: Use-after-free in Extensions
– CVE-2016-1709: Heap-buffer-overflow in sfntly
– CVE-2016-1710: Same-origin bypass in Blink
– CVE-2016-1711: Same-origin bypass in Blink
– CVE-2016-5127: Use-after-free in Blink
– CVE-2016-5128: Same-origin bypass in V8
– CVE-2016-5129: Memory corruption in V8
– CVE-2016-5130: URL spoofing
– CVE-2016-5131: Use-after-free in libxml
– CVE-2016-5132: Limited same-origin bypass in Service Workers
– CVE-2016-5133: Origin confusion in proxy authentication
– CVE-2016-5134: URL leakage via PAC script
– CVE-2016-5135: Content-Security-Policy bypass
– CVE-2016-5136: Use after free in extensions
– CVE-2016-5137: History sniffing with HSTS and CSP
– CVE-2016-1705: Various fixes from internal audits, fuzzing and other
initiatives
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.1:
zypper in -t patch openSUSE-2016-900=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE Leap 42.1 (x86_64):
chromedriver-52.0.2743.82-61.1
chromium-52.0.2743.82-61.1
chromium-desktop-gnome-52.0.2743.82-61.1
chromium-desktop-kde-52.0.2743.82-61.1
chromium-ffmpegsumo-52.0.2743.82-61.1
References:
https://www.suse.com/security/cve/CVE-2016-1705.html
https://www.suse.com/security/cve/CVE-2016-1706.html
https://www.suse.com/security/cve/CVE-2016-1707.html
https://www.suse.com/security/cve/CVE-2016-1708.html
https://www.suse.com/security/cve/CVE-2016-1709.html
https://www.suse.com/security/cve/CVE-2016-1710.html
https://www.suse.com/security/cve/CVE-2016-1711.html
https://www.suse.com/security/cve/CVE-2016-5127.html
https://www.suse.com/security/cve/CVE-2016-5128.html
https://www.suse.com/security/cve/CVE-2016-5129.html
https://www.suse.com/security/cve/CVE-2016-5130.html
https://www.suse.com/security/cve/CVE-2016-5131.html
https://www.suse.com/security/cve/CVE-2016-5132.html
https://www.suse.com/security/cve/CVE-2016-5133.html
https://www.suse.com/security/cve/CVE-2016-5134.html
https://www.suse.com/security/cve/CVE-2016-5135.html
https://www.suse.com/security/cve/CVE-2016-5136.html
https://www.suse.com/security/cve/CVE-2016-5137.html
https://bugzilla.suse.com/989901
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1868-1
Rating: important
References: #989901
Cross-References: CVE-2016-1705 CVE-2016-1706 CVE-2016-1707
CVE-2016-1708 CVE-2016-1709 CVE-2016-1710
CVE-2016-1711 CVE-2016-5127 CVE-2016-5128
CVE-2016-5129 CVE-2016-5130 CVE-2016-5131
CVE-2016-5132 CVE-2016-5133 CVE-2016-5134
CVE-2016-5135 CVE-2016-5136 CVE-2016-5137
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 18 vulnerabilities is now available.
Description:
Chromium was updated to 52.0.2743.82 to fix the following security issues
(boo#989901):
– CVE-2016-1706: Sandbox escape in PPAPI
– CVE-2016-1707: URL spoofing on iOS
– CVE-2016-1708: Use-after-free in Extensions
– CVE-2016-1709: Heap-buffer-overflow in sfntly
– CVE-2016-1710: Same-origin bypass in Blink
– CVE-2016-1711: Same-origin bypass in Blink
– CVE-2016-5127: Use-after-free in Blink
– CVE-2016-5128: Same-origin bypass in V8
– CVE-2016-5129: Memory corruption in V8
– CVE-2016-5130: URL spoofing
– CVE-2016-5131: Use-after-free in libxml
– CVE-2016-5132: Limited same-origin bypass in Service Workers
– CVE-2016-5133: Origin confusion in proxy authentication
– CVE-2016-5134: URL leakage via PAC script
– CVE-2016-5135: Content-Security-Policy bypass
– CVE-2016-5136: Use after free in extensions
– CVE-2016-5137: History sniffing with HSTS and CSP
– CVE-2016-1705: Various fixes from internal audits, fuzzing and other
initiatives
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2016-900=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):
chromedriver-52.0.2743.82-89.1
chromedriver-debuginfo-52.0.2743.82-89.1
chromium-52.0.2743.82-89.1
chromium-debuginfo-52.0.2743.82-89.1
chromium-debugsource-52.0.2743.82-89.1
chromium-desktop-gnome-52.0.2743.82-89.1
chromium-desktop-kde-52.0.2743.82-89.1
chromium-ffmpegsumo-52.0.2743.82-89.1
chromium-ffmpegsumo-debuginfo-52.0.2743.82-89.1
References:
https://www.suse.com/security/cve/CVE-2016-1705.html
https://www.suse.com/security/cve/CVE-2016-1706.html
https://www.suse.com/security/cve/CVE-2016-1707.html
https://www.suse.com/security/cve/CVE-2016-1708.html
https://www.suse.com/security/cve/CVE-2016-1709.html
https://www.suse.com/security/cve/CVE-2016-1710.html
https://www.suse.com/security/cve/CVE-2016-1711.html
https://www.suse.com/security/cve/CVE-2016-5127.html
https://www.suse.com/security/cve/CVE-2016-5128.html
https://www.suse.com/security/cve/CVE-2016-5129.html
https://www.suse.com/security/cve/CVE-2016-5130.html
https://www.suse.com/security/cve/CVE-2016-5131.html
https://www.suse.com/security/cve/CVE-2016-5132.html
https://www.suse.com/security/cve/CVE-2016-5133.html
https://www.suse.com/security/cve/CVE-2016-5134.html
https://www.suse.com/security/cve/CVE-2016-5135.html
https://www.suse.com/security/cve/CVE-2016-5136.html
https://www.suse.com/security/cve/CVE-2016-5137.html
https://bugzilla.suse.com/989901
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:1865-1
Rating: important
References: #989901
Cross-References: CVE-2016-1705 CVE-2016-1706 CVE-2016-1707
CVE-2016-1708 CVE-2016-1709 CVE-2016-1710
CVE-2016-1711 CVE-2016-5127 CVE-2016-5128
CVE-2016-5129 CVE-2016-5130 CVE-2016-5131
CVE-2016-5132 CVE-2016-5133 CVE-2016-5134
CVE-2016-5135 CVE-2016-5136 CVE-2016-5137
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes 18 vulnerabilities is now available.
Description:
Chromium was updated to 52.0.2743.82 to fix the following security issues
(boo#989901):
– CVE-2016-1706: Sandbox escape in PPAPI
– CVE-2016-1707: URL spoofing on iOS
– CVE-2016-1708: Use-after-free in Extensions
– CVE-2016-1709: Heap-buffer-overflow in sfntly
– CVE-2016-1710: Same-origin bypass in Blink
– CVE-2016-1711: Same-origin bypass in Blink
– CVE-2016-5127: Use-after-free in Blink
– CVE-2016-5128: Same-origin bypass in V8
– CVE-2016-5129: Memory corruption in V8
– CVE-2016-5130: URL spoofing
– CVE-2016-5131: Use-after-free in libxml
– CVE-2016-5132: Limited same-origin bypass in Service Workers
– CVE-2016-5133: Origin confusion in proxy authentication
– CVE-2016-5134: URL leakage via PAC script
– CVE-2016-5135: Content-Security-Policy bypass
– CVE-2016-5136: Use after free in extensions
– CVE-2016-5137: History sniffing with HSTS and CSP
– CVE-2016-1705: Various fixes from internal audits, fuzzing and other
initiatives
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– openSUSE 13.2:
zypper in -t patch openSUSE-2016-901=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE 13.2 (i586 x86_64):
chromedriver-52.0.2743.82-111.1
chromium-52.0.2743.82-111.1
chromium-desktop-gnome-52.0.2743.82-111.1
chromium-desktop-kde-52.0.2743.82-111.1
chromium-ffmpegsumo-52.0.2743.82-111.1
– openSUSE 13.2 (x86_64):
chromedriver-debuginfo-52.0.2743.82-111.1
chromium-debuginfo-52.0.2743.82-111.1
chromium-debugsource-52.0.2743.82-111.1
chromium-ffmpegsumo-debuginfo-52.0.2743.82-111.1
References:
https://www.suse.com/security/cve/CVE-2016-1705.html
https://www.suse.com/security/cve/CVE-2016-1706.html
https://www.suse.com/security/cve/CVE-2016-1707.html
https://www.suse.com/security/cve/CVE-2016-1708.html
https://www.suse.com/security/cve/CVE-2016-1709.html
https://www.suse.com/security/cve/CVE-2016-1710.html
https://www.suse.com/security/cve/CVE-2016-1711.html
https://www.suse.com/security/cve/CVE-2016-5127.html
https://www.suse.com/security/cve/CVE-2016-5128.html
https://www.suse.com/security/cve/CVE-2016-5129.html
https://www.suse.com/security/cve/CVE-2016-5130.html
https://www.suse.com/security/cve/CVE-2016-5131.html
https://www.suse.com/security/cve/CVE-2016-5132.html
https://www.suse.com/security/cve/CVE-2016-5133.html
https://www.suse.com/security/cve/CVE-2016-5134.html
https://www.suse.com/security/cve/CVE-2016-5135.html
https://www.suse.com/security/cve/CVE-2016-5136.html
https://www.suse.com/security/cve/CVE-2016-5137.html
https://bugzilla.suse.com/989901
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org