openSUSE: 2013:1861-1: important: chromium
Description
Chromium was updated to 31.0.1650.57: Stable channel update: - Security Fixes: * CVE-2013-6632: Multiple memory corruption issues. - Update to Chromium 31.0.1650.48 Stable Channel update: - Security fixes: * CVE-2013-6621: Use after free related to speech input elements.. * CVE-2013-6622: Use after free related to media elements. * CVE-2013-6623: Out of bounds read in SVG. * CVE-2013-6624: Use after free related to “id” attribute strings. * CVE-2013-6625: Use after free in DOM ranges. * CVE-2013-6626: Address bar spoofing related to interstitial warnings. * CVE-2013-6627: Out of bounds read in HTTP parsing. * CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. * CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. * CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. * CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. * CVE-2013-6631: Use after free in libjingle. - Added patch chromium-fix-chromedriver-build.diff to fix the chromedriver build - Enable ARM build for Chromium. * Added patches chromium-arm-webrtc-fix.patch, chromium-fix-arm-icu.patch and chromium-fix-arm-sysroot.patch to resolve ARM specific build issues - Update to Chromium 30.0.1599.114 Stable Channel update: fix build for 32bit systems - Drop patch chromium-fix-chromedriver-build.diff. This is now fixed upstream - For openSUSE versions lower than 13.1, build against the in-tree libicu - Update to Chromium 30.0.1599.101 - Security Fixes: + CVE-2013-2925: Use after free in XHR + CVE-2013-2926: Use after free in editing + CVE-2013-2927: Use after free in forms. + CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives. - Update to Chromium 30.0.1599.66 - Easier searching by image - A number of new apps/extension APIs - Lots of under the hood changes for stability and performance - Security fixes: + CVE-2013-2906: Races in Web Audio + CVE-2013-2907: Out of bounds read in Window.prototype object + CVE-2013-2908: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2909: Use after free in inline-block rendering + CVE-2013-2910: Use-after-free in Web Audio + CVE-2013-2911: Use-after-free in XSLT + CVE-2013-2912: Use-after-free in PPAPI + CVE-2013-2913: Use-after-free in XML document parsing + CVE-2013-2914: Use after free in the Windows color chooser dialog + CVE-2013-2915: Address bar spoofing via a malformed scheme + CVE-2013-2916: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2917: Out of bounds read in Web Audio + CVE-2013-2918: Use-after-free in DOM + CVE-2013-2919: Memory corruption in V8 + CVE-2013-2920: Out of bounds read in URL parsing + CVE-2013-2921: Use-after-free in resource loader + CVE-2013-2922: Use-after-free in template element + CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives + CVE-2013-2924: Use-after-free in ICU. Upstream bug
Patch
Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2013-961 To bring your system up-to-date, use "zypper patch".
Package List
- openSUSE 13.1 (i586 x86_64): chromedriver-31.0.1650.57-8.2 chromedriver-debuginfo-31.0.1650.57-8.2 chromium-31.0.1650.57-8.2 chromium-debuginfo-31.0.1650.57-8.2 chromium-debugsource-31.0.1650.57-8.2 chromium-desktop-gnome-31.0.1650.57-8.2 chromium-desktop-kde-31.0.1650.57-8.2 chromium-ffmpegsumo-31.0.1650.57-8.2 chromium-ffmpegsumo-debuginfo-31.0.1650.57-8.2 chromium-suid-helper-31.0.1650.57-8.2 chromium-suid-helper-debuginfo-31.0.1650.57-8.2
References
https://www.suse.com/security/cve/CVE-2013-2906.html https://www.suse.com/security/cve/CVE-2013-2907.html https://www.suse.com/security/cve/CVE-2013-2908.html https://www.suse.com/security/cve/CVE-2013-2909.html https://www.suse.com/security/cve/CVE-2013-2910.html https://www.suse.com/security/cve/CVE-2013-2911.html https://www.suse.com/security/cve/CVE-2013-2912.html https://www.suse.com/security/cve/CVE-2013-2913.html https://www.suse.com/security/cve/CVE-2013-2914.html https://www.suse.com/security/cve/CVE-2013-2915.html https://www.suse.com/security/cve/CVE-2013-2916.html https://www.suse.com/security/cve/CVE-2013-2917.html https://www.suse.com/security/cve/CVE-2013-2918.html https://www.suse.com/security/cve/CVE-2013-2919.html https://www.suse.com/security/cve/CVE-2013-2920.html https://www.suse.com/security/cve/CVE-2013-2921.html https://www.suse.com/security/cve/CVE-2013-2922.html https://www.suse.com/security/cve/CVE-2013-2923.html https://www.suse.com/security/cve/CVE-2013-2924.html https://www.suse.com/security/cve/CVE-2013-2925.html https://www.suse.com/security/cve/CVE-2013-2926.html https://www.suse.com/security/cve/CVE-2013-2927.html https://www.suse.com/security/cve/CVE-2013-2928.html https://www.suse.com/security/cve/CVE-2013-2931.html https://www.suse.com/security/cve/CVE-2013-6621.html https://www.suse.com/security/cve/CVE-2013-6622.html https://www.suse.com/security/cve/CVE-2013-6623.html https://www.suse.com/security/cve/CVE-2013-6624.html https://www.suse.com/security/cve/CVE-2013-6625.html https://www.suse.com/security/cve/CVE-2013-6626.html https://www.suse.com/security/cve/CVE-2013-6627.html https://www.suse.com/security/cve/CVE-2013-6628.html https://www.suse.com/security/cve/CVE-2013-6629.html https://www.suse.com/security/cve/CVE-2013-6630.html https://www.suse.com/security/cve/CVE-2013-6631.html https://www.suse.com/security/cve/CVE-2013-6632.html--