openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:1484-1
Rating: important
References: #1095163
Cross-References: CVE-2018-6123 CVE-2018-6124 CVE-2018-6125
CVE-2018-6126 CVE-2018-6127 CVE-2018-6128
CVE-2018-6129 CVE-2018-6130 CVE-2018-6131
CVE-2018-6132 CVE-2018-6133 CVE-2018-6134
CVE-2018-6135 CVE-2018-6136 CVE-2018-6137
CVE-2018-6138 CVE-2018-6139 CVE-2018-6140
CVE-2018-6141 CVE-2018-6142 CVE-2018-6143
CVE-2018-6144 CVE-2018-6145 CVE-2018-6147
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes 24 vulnerabilities is now available.
Description:
This update for chromium to version 66.0.3359.181 fixes the following
issues:
The following security issues were fixed (boo#1095163):
* CVE-2018-6123: Use after free in Blink.
* CVE-2018-6124: Type confusion in Blink.
* CVE-2018-6125: Overly permissive policy in WebUSB.
* CVE-2018-6126: Heap buffer overflow in Skia.
* CVE-2018-6127: Use after free in indexedDB.
* CVE-2018-6128: uXSS in Chrome on iOS.
* CVE-2018-6129: Out of bounds memory access in WebRTC.
* CVE-2018-6130: Out of bounds memory access in WebRTC.
* CVE-2018-6131: Incorrect mutability protection in WebAssembly.
* CVE-2018-6132: Use of uninitialized memory in WebRTC.
* CVE-2018-6133: URL spoof in Omnibox.
* CVE-2018-6134: Referrer Policy bypass in Blink.
* CVE-2018-6135: UI spoofing in Blink.
* CVE-2018-6136: Out of bounds memory access in V8.
* CVE-2018-6137: Leak of visited status of page in Blink.
* CVE-2018-6138: Overly permissive policy in Extensions.
* CVE-2018-6139: Restrictions bypass in the debugger extension API.
* CVE-2018-6140: Restrictions bypass in the debugger extension API.
* CVE-2018-6141: Heap buffer overflow in Skia.
* CVE-2018-6142: Out of bounds memory access in V8.
* CVE-2018-6143: Out of bounds memory access in V8.
* CVE-2018-6144: Out of bounds memory access in PDFium.
* CVE-2018-6145: Incorrect escaping of MathML in Blink.
* CVE-2018-6147: Password fields not taking advantage of OS protections in
Views.
Additional changes:
* Autoplay: Force enable on desktop for Web Audio
This update enables the “Strict site isolation” feature for a larger
percentage of users. This feature is a mitigation against the Spectre
vulnerabilities. It can be turned on via:
chrome://flags/#enable-site-per-process It can be disabled via:
chrome://flags/#site-isolation-trial-opt-out
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-546=1
– openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-546=1
Package List:
– openSUSE Leap 42.3 (x86_64):
chromedriver-67.0.3396.62-161.1
chromedriver-debuginfo-67.0.3396.62-161.1
chromium-67.0.3396.62-161.1
chromium-debuginfo-67.0.3396.62-161.1
chromium-debugsource-67.0.3396.62-161.1
– openSUSE Leap 15.0 (x86_64):
chromedriver-67.0.3396.62-lp150.2.3.1
chromedriver-debuginfo-67.0.3396.62-lp150.2.3.1
chromium-67.0.3396.62-lp150.2.3.1
chromium-debuginfo-67.0.3396.62-lp150.2.3.1
chromium-debugsource-67.0.3396.62-lp150.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-6123.html
https://www.suse.com/security/cve/CVE-2018-6124.html
https://www.suse.com/security/cve/CVE-2018-6125.html
https://www.suse.com/security/cve/CVE-2018-6126.html
https://www.suse.com/security/cve/CVE-2018-6127.html
https://www.suse.com/security/cve/CVE-2018-6128.html
https://www.suse.com/security/cve/CVE-2018-6129.html
https://www.suse.com/security/cve/CVE-2018-6130.html
https://www.suse.com/security/cve/CVE-2018-6131.html
https://www.suse.com/security/cve/CVE-2018-6132.html
https://www.suse.com/security/cve/CVE-2018-6133.html
https://www.suse.com/security/cve/CVE-2018-6134.html
https://www.suse.com/security/cve/CVE-2018-6135.html
https://www.suse.com/security/cve/CVE-2018-6136.html
https://www.suse.com/security/cve/CVE-2018-6137.html
https://www.suse.com/security/cve/CVE-2018-6138.html
https://www.suse.com/security/cve/CVE-2018-6139.html
https://www.suse.com/security/cve/CVE-2018-6140.html
https://www.suse.com/security/cve/CVE-2018-6141.html
https://www.suse.com/security/cve/CVE-2018-6142.html
https://www.suse.com/security/cve/CVE-2018-6143.html
https://www.suse.com/security/cve/CVE-2018-6144.html
https://www.suse.com/security/cve/CVE-2018-6145.html
https://www.suse.com/security/cve/CVE-2018-6147.html
https://bugzilla.suse.com/1095163
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:1485-1
Rating: important
References: #1095163
Cross-References: CVE-2018-6123 CVE-2018-6124 CVE-2018-6125
CVE-2018-6126 CVE-2018-6127 CVE-2018-6128
CVE-2018-6129 CVE-2018-6130 CVE-2018-6131
CVE-2018-6132 CVE-2018-6133 CVE-2018-6134
CVE-2018-6135 CVE-2018-6136 CVE-2018-6137
CVE-2018-6138 CVE-2018-6139 CVE-2018-6140
CVE-2018-6141 CVE-2018-6142 CVE-2018-6143
CVE-2018-6144 CVE-2018-6145 CVE-2018-6147
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 24 vulnerabilities is now available.
Description:
This update for chromium to version 66.0.3359.181 fixes the following
issues:
The following security issues were fixed (boo#1095163):
* CVE-2018-6123: Use after free in Blink.
* CVE-2018-6124: Type confusion in Blink.
* CVE-2018-6125: Overly permissive policy in WebUSB.
* CVE-2018-6126: Heap buffer overflow in Skia.
* CVE-2018-6127: Use after free in indexedDB.
* CVE-2018-6128: uXSS in Chrome on iOS.
* CVE-2018-6129: Out of bounds memory access in WebRTC.
* CVE-2018-6130: Out of bounds memory access in WebRTC.
* CVE-2018-6131: Incorrect mutability protection in WebAssembly.
* CVE-2018-6132: Use of uninitialized memory in WebRTC.
* CVE-2018-6133: URL spoof in Omnibox.
* CVE-2018-6134: Referrer Policy bypass in Blink.
* CVE-2018-6135: UI spoofing in Blink.
* CVE-2018-6136: Out of bounds memory access in V8.
* CVE-2018-6137: Leak of visited status of page in Blink.
* CVE-2018-6138: Overly permissive policy in Extensions.
* CVE-2018-6139: Restrictions bypass in the debugger extension API.
* CVE-2018-6140: Restrictions bypass in the debugger extension API.
* CVE-2018-6141: Heap buffer overflow in Skia.
* CVE-2018-6142: Out of bounds memory access in V8.
* CVE-2018-6143: Out of bounds memory access in V8.
* CVE-2018-6144: Out of bounds memory access in PDFium.
* CVE-2018-6145: Incorrect escaping of MathML in Blink.
* CVE-2018-6147: Password fields not taking advantage of OS protections in
Views.
Additional changes:
* Autoplay: Force enable on desktop for Web Audio
This update enables the “Strict site isolation” feature for a larger
percentage of users. This feature is a mitigation against the Spectre
vulnerabilities. It can be turned on via:
chrome://flags/#enable-site-per-process It can be disabled via:
chrome://flags/#site-isolation-trial-opt-out
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2018-546=1
Package List:
– SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):
chromedriver-67.0.3396.62-58.1
chromedriver-debuginfo-67.0.3396.62-58.1
chromium-67.0.3396.62-58.1
chromium-debuginfo-67.0.3396.62-58.1
chromium-debugsource-67.0.3396.62-58.1
References:
https://www.suse.com/security/cve/CVE-2018-6123.html
https://www.suse.com/security/cve/CVE-2018-6124.html
https://www.suse.com/security/cve/CVE-2018-6125.html
https://www.suse.com/security/cve/CVE-2018-6126.html
https://www.suse.com/security/cve/CVE-2018-6127.html
https://www.suse.com/security/cve/CVE-2018-6128.html
https://www.suse.com/security/cve/CVE-2018-6129.html
https://www.suse.com/security/cve/CVE-2018-6130.html
https://www.suse.com/security/cve/CVE-2018-6131.html
https://www.suse.com/security/cve/CVE-2018-6132.html
https://www.suse.com/security/cve/CVE-2018-6133.html
https://www.suse.com/security/cve/CVE-2018-6134.html
https://www.suse.com/security/cve/CVE-2018-6135.html
https://www.suse.com/security/cve/CVE-2018-6136.html
https://www.suse.com/security/cve/CVE-2018-6137.html
https://www.suse.com/security/cve/CVE-2018-6138.html
https://www.suse.com/security/cve/CVE-2018-6139.html
https://www.suse.com/security/cve/CVE-2018-6140.html
https://www.suse.com/security/cve/CVE-2018-6141.html
https://www.suse.com/security/cve/CVE-2018-6142.html
https://www.suse.com/security/cve/CVE-2018-6143.html
https://www.suse.com/security/cve/CVE-2018-6144.html
https://www.suse.com/security/cve/CVE-2018-6145.html
https://www.suse.com/security/cve/CVE-2018-6147.html
https://bugzilla.suse.com/1095163
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org