openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:2134-1
Rating: important
References: #1102530
Cross-References: CVE-2018-4117 CVE-2018-6044 CVE-2018-6153
CVE-2018-6154 CVE-2018-6155 CVE-2018-6156
CVE-2018-6157 CVE-2018-6158 CVE-2018-6159
CVE-2018-6161 CVE-2018-6162 CVE-2018-6163
CVE-2018-6164 CVE-2018-6165 CVE-2018-6166
CVE-2018-6167 CVE-2018-6168 CVE-2018-6169
CVE-2018-6170 CVE-2018-6171 CVE-2018-6172
CVE-2018-6173 CVE-2018-6174 CVE-2018-6175
CVE-2018-6176 CVE-2018-6177 CVE-2018-6178
CVE-2018-6179
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes 28 vulnerabilities is now available.
Description:
This update for Chromium to version 68.0.3440.75 fixes multiple issues.
Security issues fixed (boo#1102530):
– CVE-2018-6153: Stack buffer overflow in Skia
– CVE-2018-6154: Heap buffer overflow in WebGL
– CVE-2018-6155: Use after free in WebRTC
– CVE-2018-6156: Heap buffer overflow in WebRTC
– CVE-2018-6157: Type confusion in WebRTC
– CVE-2018-6158: Use after free in Blink
– CVE-2018-6159: Same origin policy bypass in ServiceWorker
– CVE-2018-6161: Same origin policy bypass in WebAudio
– CVE-2018-6162: Heap buffer overflow in WebGL
– CVE-2018-6163: URL spoof in Omnibox
– CVE-2018-6164: Same origin policy bypass in ServiceWorker
– CVE-2018-6165: URL spoof in Omnibox
– CVE-2018-6166: URL spoof in Omnibox
– CVE-2018-6167: URL spoof in Omnibox
– CVE-2018-6168: CORS bypass in Blink
– CVE-2018-6169: Permissions bypass in extension installation
– CVE-2018-6170: Type confusion in PDFium
– CVE-2018-6171: Use after free in WebBluetooth
– CVE-2018-6172: URL spoof in Omnibox
– CVE-2018-6173: URL spoof in Omnibox
– CVE-2018-6174: Integer overflow in SwiftShader
– CVE-2018-6175: URL spoof in Omnibox
– CVE-2018-6176: Local user privilege escalation in Extensions
– CVE-2018-6177: Cross origin information leak in Blink
– CVE-2018-6178: UI spoof in Extensions
– CVE-2018-6179: Local file information leak in Extensions
– CVE-2018-6044: Request privilege escalation in Extensions
– CVE-2018-4117: Cross origin information leak in Blink
The following user interface changes are included:
– Chrome will show the “Not secure” warning on all plain HTTP pages
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.3:
zypper in -t patch openSUSE-2018-780=1
– openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-780=1
Package List:
– openSUSE Leap 42.3 (x86_64):
chromedriver-68.0.3440.75-164.1
chromedriver-debuginfo-68.0.3440.75-164.1
chromium-68.0.3440.75-164.1
chromium-debuginfo-68.0.3440.75-164.1
chromium-debugsource-68.0.3440.75-164.1
– openSUSE Leap 15.0 (x86_64):
chromedriver-68.0.3440.75-lp150.2.6.1
chromedriver-debuginfo-68.0.3440.75-lp150.2.6.1
chromium-68.0.3440.75-lp150.2.6.1
chromium-debuginfo-68.0.3440.75-lp150.2.6.1
chromium-debugsource-68.0.3440.75-lp150.2.6.1
References:
https://www.suse.com/security/cve/CVE-2018-4117.html
https://www.suse.com/security/cve/CVE-2018-6044.html
https://www.suse.com/security/cve/CVE-2018-6153.html
https://www.suse.com/security/cve/CVE-2018-6154.html
https://www.suse.com/security/cve/CVE-2018-6155.html
https://www.suse.com/security/cve/CVE-2018-6156.html
https://www.suse.com/security/cve/CVE-2018-6157.html
https://www.suse.com/security/cve/CVE-2018-6158.html
https://www.suse.com/security/cve/CVE-2018-6159.html
https://www.suse.com/security/cve/CVE-2018-6161.html
https://www.suse.com/security/cve/CVE-2018-6162.html
https://www.suse.com/security/cve/CVE-2018-6163.html
https://www.suse.com/security/cve/CVE-2018-6164.html
https://www.suse.com/security/cve/CVE-2018-6165.html
https://www.suse.com/security/cve/CVE-2018-6166.html
https://www.suse.com/security/cve/CVE-2018-6167.html
https://www.suse.com/security/cve/CVE-2018-6168.html
https://www.suse.com/security/cve/CVE-2018-6169.html
https://www.suse.com/security/cve/CVE-2018-6170.html
https://www.suse.com/security/cve/CVE-2018-6171.html
https://www.suse.com/security/cve/CVE-2018-6172.html
https://www.suse.com/security/cve/CVE-2018-6173.html
https://www.suse.com/security/cve/CVE-2018-6174.html
https://www.suse.com/security/cve/CVE-2018-6175.html
https://www.suse.com/security/cve/CVE-2018-6176.html
https://www.suse.com/security/cve/CVE-2018-6177.html
https://www.suse.com/security/cve/CVE-2018-6178.html
https://www.suse.com/security/cve/CVE-2018-6179.html
https://bugzilla.suse.com/1102530
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:2135-1
Rating: important
References: #1102530
Cross-References: CVE-2018-4117 CVE-2018-6044 CVE-2018-6153
CVE-2018-6154 CVE-2018-6155 CVE-2018-6156
CVE-2018-6157 CVE-2018-6158 CVE-2018-6159
CVE-2018-6161 CVE-2018-6162 CVE-2018-6163
CVE-2018-6164 CVE-2018-6165 CVE-2018-6166
CVE-2018-6167 CVE-2018-6168 CVE-2018-6169
CVE-2018-6170 CVE-2018-6171 CVE-2018-6172
CVE-2018-6173 CVE-2018-6174 CVE-2018-6175
CVE-2018-6176 CVE-2018-6177 CVE-2018-6178
CVE-2018-6179
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 28 vulnerabilities is now available.
Description:
This update for Chromium to version 68.0.3440.75 fixes multiple issues.
Security issues fixed (boo#1102530):
– CVE-2018-6153: Stack buffer overflow in Skia
– CVE-2018-6154: Heap buffer overflow in WebGL
– CVE-2018-6155: Use after free in WebRTC
– CVE-2018-6156: Heap buffer overflow in WebRTC
– CVE-2018-6157: Type confusion in WebRTC
– CVE-2018-6158: Use after free in Blink
– CVE-2018-6159: Same origin policy bypass in ServiceWorker
– CVE-2018-6161: Same origin policy bypass in WebAudio
– CVE-2018-6162: Heap buffer overflow in WebGL
– CVE-2018-6163: URL spoof in Omnibox
– CVE-2018-6164: Same origin policy bypass in ServiceWorker
– CVE-2018-6165: URL spoof in Omnibox
– CVE-2018-6166: URL spoof in Omnibox
– CVE-2018-6167: URL spoof in Omnibox
– CVE-2018-6168: CORS bypass in Blink
– CVE-2018-6169: Permissions bypass in extension installation
– CVE-2018-6170: Type confusion in PDFium
– CVE-2018-6171: Use after free in WebBluetooth
– CVE-2018-6172: URL spoof in Omnibox
– CVE-2018-6173: URL spoof in Omnibox
– CVE-2018-6174: Integer overflow in SwiftShader
– CVE-2018-6175: URL spoof in Omnibox
– CVE-2018-6176: Local user privilege escalation in Extensions
– CVE-2018-6177: Cross origin information leak in Blink
– CVE-2018-6178: UI spoof in Extensions
– CVE-2018-6179: Local file information leak in Extensions
– CVE-2018-6044: Request privilege escalation in Extensions
– CVE-2018-4117: Cross origin information leak in Blink
The following user interface changes are included:
– Chrome will show the “Not secure” warning on all plain HTTP pages
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2018-780=1
Package List:
– SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):
chromedriver-68.0.3440.75-61.1
chromedriver-debuginfo-68.0.3440.75-61.1
chromium-68.0.3440.75-61.1
chromium-debuginfo-68.0.3440.75-61.1
chromium-debugsource-68.0.3440.75-61.1
References:
https://www.suse.com/security/cve/CVE-2018-4117.html
https://www.suse.com/security/cve/CVE-2018-6044.html
https://www.suse.com/security/cve/CVE-2018-6153.html
https://www.suse.com/security/cve/CVE-2018-6154.html
https://www.suse.com/security/cve/CVE-2018-6155.html
https://www.suse.com/security/cve/CVE-2018-6156.html
https://www.suse.com/security/cve/CVE-2018-6157.html
https://www.suse.com/security/cve/CVE-2018-6158.html
https://www.suse.com/security/cve/CVE-2018-6159.html
https://www.suse.com/security/cve/CVE-2018-6161.html
https://www.suse.com/security/cve/CVE-2018-6162.html
https://www.suse.com/security/cve/CVE-2018-6163.html
https://www.suse.com/security/cve/CVE-2018-6164.html
https://www.suse.com/security/cve/CVE-2018-6165.html
https://www.suse.com/security/cve/CVE-2018-6166.html
https://www.suse.com/security/cve/CVE-2018-6167.html
https://www.suse.com/security/cve/CVE-2018-6168.html
https://www.suse.com/security/cve/CVE-2018-6169.html
https://www.suse.com/security/cve/CVE-2018-6170.html
https://www.suse.com/security/cve/CVE-2018-6171.html
https://www.suse.com/security/cve/CVE-2018-6172.html
https://www.suse.com/security/cve/CVE-2018-6173.html
https://www.suse.com/security/cve/CVE-2018-6174.html
https://www.suse.com/security/cve/CVE-2018-6175.html
https://www.suse.com/security/cve/CVE-2018-6176.html
https://www.suse.com/security/cve/CVE-2018-6177.html
https://www.suse.com/security/cve/CVE-2018-6178.html
https://www.suse.com/security/cve/CVE-2018-6179.html
https://bugzilla.suse.com/1102530
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org