openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:1502-1
Rating: important
References: #1042833
Cross-References: CVE-2017-5070 CVE-2017-5071 CVE-2017-5072
CVE-2017-5073 CVE-2017-5074 CVE-2017-5075
CVE-2017-5076 CVE-2017-5077 CVE-2017-5078
CVE-2017-5079 CVE-2017-5080 CVE-2017-5081
CVE-2017-5082 CVE-2017-5083 CVE-2017-5085
CVE-2017-5086
Affected Products:
openSUSE Leap 42.2
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
This update to Chromium 59.0.3071.86 fixes the following security issues:
– CVE-2017-5070: Type confusion in V8
– CVE-2017-5071: Out of bounds read in V8
– CVE-2017-5072: Address spoofing in Omnibox
– CVE-2017-5073: Use after free in print preview
– CVE-2017-5074: Use after free in Apps Bluetooth
– CVE-2017-5075: Information leak in CSP reporting
– CVE-2017-5086: Address spoofing in Omnibox
– CVE-2017-5076: Address spoofing in Omnibox
– CVE-2017-5077: Heap buffer overflow in Skia
– CVE-2017-5078: Possible command injection in mailto handling
– CVE-2017-5079: UI spoofing in Blink
– CVE-2017-5080: Use after free in credit card autofill
– CVE-2017-5081: Extension verification bypass
– CVE-2017-5082: Insufficient hardening in credit card editor
– CVE-2017-5083: UI spoofing in Blink
– CVE-2017-5085: Inappropriate javascript execution on WebUI pages
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.2:
zypper in -t patch openSUSE-2017-661=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE Leap 42.2 (x86_64):
chromedriver-59.0.3071.86-104.15.1
chromedriver-debuginfo-59.0.3071.86-104.15.1
chromium-59.0.3071.86-104.15.1
chromium-debuginfo-59.0.3071.86-104.15.1
chromium-debugsource-59.0.3071.86-104.15.1
References:
https://www.suse.com/security/cve/CVE-2017-5070.html
https://www.suse.com/security/cve/CVE-2017-5071.html
https://www.suse.com/security/cve/CVE-2017-5072.html
https://www.suse.com/security/cve/CVE-2017-5073.html
https://www.suse.com/security/cve/CVE-2017-5074.html
https://www.suse.com/security/cve/CVE-2017-5075.html
https://www.suse.com/security/cve/CVE-2017-5076.html
https://www.suse.com/security/cve/CVE-2017-5077.html
https://www.suse.com/security/cve/CVE-2017-5078.html
https://www.suse.com/security/cve/CVE-2017-5079.html
https://www.suse.com/security/cve/CVE-2017-5080.html
https://www.suse.com/security/cve/CVE-2017-5081.html
https://www.suse.com/security/cve/CVE-2017-5082.html
https://www.suse.com/security/cve/CVE-2017-5083.html
https://www.suse.com/security/cve/CVE-2017-5085.html
https://www.suse.com/security/cve/CVE-2017-5086.html
https://bugzilla.suse.com/1042833
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2017:1501-1
Rating: important
References: #1042833
Cross-References: CVE-2017-5070 CVE-2017-5071 CVE-2017-5072
CVE-2017-5073 CVE-2017-5074 CVE-2017-5075
CVE-2017-5076 CVE-2017-5077 CVE-2017-5078
CVE-2017-5079 CVE-2017-5080 CVE-2017-5081
CVE-2017-5082 CVE-2017-5083 CVE-2017-5085
CVE-2017-5086
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
This update to Chromium 59.0.3071.86 fixes the following security issues:
– CVE-2017-5070: Type confusion in V8
– CVE-2017-5071: Out of bounds read in V8
– CVE-2017-5072: Address spoofing in Omnibox
– CVE-2017-5073: Use after free in print preview
– CVE-2017-5074: Use after free in Apps Bluetooth
– CVE-2017-5075: Information leak in CSP reporting
– CVE-2017-5086: Address spoofing in Omnibox
– CVE-2017-5076: Address spoofing in Omnibox
– CVE-2017-5077: Heap buffer overflow in Skia
– CVE-2017-5078: Possible command injection in mailto handling
– CVE-2017-5079: UI spoofing in Blink
– CVE-2017-5080: Use after free in credit card autofill
– CVE-2017-5081: Extension verification bypass
– CVE-2017-5082: Insufficient hardening in credit card editor
– CVE-2017-5083: UI spoofing in Blink
– CVE-2017-5085: Inappropriate javascript execution on WebUI pages
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2017-661=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):
chromedriver-59.0.3071.86-20.1
chromedriver-debuginfo-59.0.3071.86-20.1
chromium-59.0.3071.86-20.1
chromium-debuginfo-59.0.3071.86-20.1
chromium-debugsource-59.0.3071.86-20.1
References:
https://www.suse.com/security/cve/CVE-2017-5070.html
https://www.suse.com/security/cve/CVE-2017-5071.html
https://www.suse.com/security/cve/CVE-2017-5072.html
https://www.suse.com/security/cve/CVE-2017-5073.html
https://www.suse.com/security/cve/CVE-2017-5074.html
https://www.suse.com/security/cve/CVE-2017-5075.html
https://www.suse.com/security/cve/CVE-2017-5076.html
https://www.suse.com/security/cve/CVE-2017-5077.html
https://www.suse.com/security/cve/CVE-2017-5078.html
https://www.suse.com/security/cve/CVE-2017-5079.html
https://www.suse.com/security/cve/CVE-2017-5080.html
https://www.suse.com/security/cve/CVE-2017-5081.html
https://www.suse.com/security/cve/CVE-2017-5082.html
https://www.suse.com/security/cve/CVE-2017-5083.html
https://www.suse.com/security/cve/CVE-2017-5085.html
https://www.suse.com/security/cve/CVE-2017-5086.html
https://bugzilla.suse.com/1042833
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org