openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:4056-1
Rating: important
References: #1118529
Cross-References: CVE-2018-17480 CVE-2018-17481 CVE-2018-18335
CVE-2018-18336 CVE-2018-18337 CVE-2018-18338
CVE-2018-18339 CVE-2018-18340 CVE-2018-18341
CVE-2018-18342 CVE-2018-18343 CVE-2018-18344
CVE-2018-18345 CVE-2018-18346 CVE-2018-18347
CVE-2018-18348 CVE-2018-18349 CVE-2018-18350
CVE-2018-18351 CVE-2018-18352 CVE-2018-18353
CVE-2018-18354 CVE-2018-18355 CVE-2018-18356
CVE-2018-18357 CVE-2018-18358 CVE-2018-18359
Affected Products:
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________
An update that fixes 27 vulnerabilities is now available.
Description:
This update to Chromium version 71.0.3578.80 fixes security issues and
bugs.
Security issues fixed (boo#1118529):
– CVE-2018-17480: Out of bounds write in V8
– CVE-2018-17481: Use after frees in PDFium
– CVE-2018-18335: Heap buffer overflow in Skia
– CVE-2018-18336: Use after free in PDFium
– CVE-2018-18337: Use after free in Blink
– CVE-2018-18338: Heap buffer overflow in Canvas
– CVE-2018-18339: Use after free in WebAudio
– CVE-2018-18340: Use after free in MediaRecorder
– CVE-2018-18341: Heap buffer overflow in Blink
– CVE-2018-18342: Out of bounds write in V8
– CVE-2018-18343: Use after free in Skia
– CVE-2018-18344: Inappropriate implementation in Extensions
– Multiple issues in SQLite via WebSQL
– CVE-2018-18345: Inappropriate implementation in Site Isolation
– CVE-2018-18346: Incorrect security UI in Blink
– CVE-2018-18347: Inappropriate implementation in Navigation
– CVE-2018-18348: Inappropriate implementation in Omnibox
– CVE-2018-18349: Insufficient policy enforcement in Blink
– CVE-2018-18350: Insufficient policy enforcement in Blink
– CVE-2018-18351: Insufficient policy enforcement in Navigation
– CVE-2018-18352: Inappropriate implementation in Media
– CVE-2018-18353: Inappropriate implementation in Network Authentication
– CVE-2018-18354: Insufficient data validation in Shell Integration
– CVE-2018-18355: Insufficient policy enforcement in URL Formatter
– CVE-2018-18356: Use after free in Skia
– CVE-2018-18357: Insufficient policy enforcement in URL Formatter
– CVE-2018-18358: Insufficient policy enforcement in Proxy
– CVE-2018-18359: Out of bounds read in V8
– Inappropriate implementation in PDFium
– Use after free in Extensions
– Inappropriate implementation in Navigation
– Insufficient policy enforcement in Navigation
– Insufficient policy enforcement in URL Formatter
– Various fixes from internal audits, fuzzing and other initiatives
The following changes are included:
– advertisements posing as error messages are now blocked
– Automatic playing of content at page load mostly disabled
– New JavaScript API for relative time display
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1521=1
– openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2018-1521=1
Package List:
– openSUSE Leap 15.0 (x86_64):
chromedriver-71.0.3578.80-lp150.2.30.1
chromedriver-debuginfo-71.0.3578.80-lp150.2.30.1
chromium-71.0.3578.80-lp150.2.30.1
chromium-debuginfo-71.0.3578.80-lp150.2.30.1
chromium-debugsource-71.0.3578.80-lp150.2.30.1
– openSUSE Backports SLE-15 (aarch64 x86_64):
chromedriver-71.0.3578.80-bp150.2.23.1
chromedriver-debuginfo-71.0.3578.80-bp150.2.23.1
chromium-71.0.3578.80-bp150.2.23.1
chromium-debuginfo-71.0.3578.80-bp150.2.23.1
chromium-debugsource-71.0.3578.80-bp150.2.23.1
References:
https://www.suse.com/security/cve/CVE-2018-17480.html
https://www.suse.com/security/cve/CVE-2018-17481.html
https://www.suse.com/security/cve/CVE-2018-18335.html
https://www.suse.com/security/cve/CVE-2018-18336.html
https://www.suse.com/security/cve/CVE-2018-18337.html
https://www.suse.com/security/cve/CVE-2018-18338.html
https://www.suse.com/security/cve/CVE-2018-18339.html
https://www.suse.com/security/cve/CVE-2018-18340.html
https://www.suse.com/security/cve/CVE-2018-18341.html
https://www.suse.com/security/cve/CVE-2018-18342.html
https://www.suse.com/security/cve/CVE-2018-18343.html
https://www.suse.com/security/cve/CVE-2018-18344.html
https://www.suse.com/security/cve/CVE-2018-18345.html
https://www.suse.com/security/cve/CVE-2018-18346.html
https://www.suse.com/security/cve/CVE-2018-18347.html
https://www.suse.com/security/cve/CVE-2018-18348.html
https://www.suse.com/security/cve/CVE-2018-18349.html
https://www.suse.com/security/cve/CVE-2018-18350.html
https://www.suse.com/security/cve/CVE-2018-18351.html
https://www.suse.com/security/cve/CVE-2018-18352.html
https://www.suse.com/security/cve/CVE-2018-18353.html
https://www.suse.com/security/cve/CVE-2018-18354.html
https://www.suse.com/security/cve/CVE-2018-18355.html
https://www.suse.com/security/cve/CVE-2018-18356.html
https://www.suse.com/security/cve/CVE-2018-18357.html
https://www.suse.com/security/cve/CVE-2018-18358.html
https://www.suse.com/security/cve/CVE-2018-18359.html
https://bugzilla.suse.com/1118529
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org