openSUSE Security Update: chromium: update to 31.0.1650.57
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2013:1861-1
Rating:             important
References:         
Cross-References:   CVE-2013-2906 CVE-2013-2907 CVE-2013-2908
                    CVE-2013-2909 CVE-2013-2910 CVE-2013-2911
                    CVE-2013-2912 CVE-2013-2913 CVE-2013-2914
                    CVE-2013-2915 CVE-2013-2916 CVE-2013-2917
                    CVE-2013-2918 CVE-2013-2919 CVE-2013-2920
                    CVE-2013-2921 CVE-2013-2922 CVE-2013-2923
                    CVE-2013-2924 CVE-2013-2925 CVE-2013-2926
                    CVE-2013-2927 CVE-2013-2928 CVE-2013-2931
                    CVE-2013-6621 CVE-2013-6622 CVE-2013-6623
                    CVE-2013-6624 CVE-2013-6625 CVE-2013-6626
                    CVE-2013-6627 CVE-2013-6628 CVE-2013-6629
                    CVE-2013-6630 CVE-2013-6631 CVE-2013-6632
                   
Affected Products:
                    openSUSE 13.1
______________________________________________________________________________

   An update that fixes 36 vulnerabilities is now available.

Description:


   Chromium was updated to 31.0.1650.57: Stable channel update:
   - Security Fixes:
   * CVE-2013-6632: Multiple memory corruption issues.
   - Update to Chromium 31.0.1650.48 Stable Channel update:
   - Security fixes:
   * CVE-2013-6621: Use after free related to speech input
   elements..
   * CVE-2013-6622: Use after free related to media
   elements.
   * CVE-2013-6623: Out of bounds read in SVG.
   * CVE-2013-6624: Use after free related to “id”
   attribute strings.
   * CVE-2013-6625: Use after free in DOM ranges.
   * CVE-2013-6626: Address bar spoofing related to
   interstitial warnings.
   * CVE-2013-6627: Out of bounds read in HTTP parsing.
   * CVE-2013-6628: Issue with certificates not being
   checked during TLS renegotiation.
   * CVE-2013-2931: Various fixes from internal audits,
   fuzzing and other initiatives.
   * CVE-2013-6629: Read of uninitialized memory in
   libjpeg and libjpeg-turbo.
   * CVE-2013-6630: Read of uninitialized memory in
   libjpeg-turbo.
   * CVE-2013-6631: Use after free in libjingle.
   - Added patch chromium-fix-chromedriver-build.diff to fix
   the  chromedriver build

   - Enable ARM build for Chromium.
   * Added patches chromium-arm-webrtc-fix.patch,
   chromium-fix-arm-icu.patch and
   chromium-fix-arm-sysroot.patch to resolve ARM specific
   build issues

   - Update to Chromium 30.0.1599.114 Stable Channel update:
   fix build for 32bit systems
   - Drop patch chromium-fix-chromedriver-build.diff. This is
   now  fixed upstream
   - For openSUSE versions lower than 13.1, build against the
   in-tree libicu

   - Update to Chromium 30.0.1599.101
   - Security Fixes:
   + CVE-2013-2925: Use after free in XHR
   + CVE-2013-2926: Use after free in editing
   + CVE-2013-2927: Use after free in forms.
   + CVE-2013-2928: Various fixes from internal audits,
   fuzzing and other initiatives.

   - Update to Chromium 30.0.1599.66
   - Easier searching by image
   - A number of new apps/extension APIs
   - Lots of under the hood changes for stability and
   performance
   - Security fixes:
   + CVE-2013-2906: Races in Web Audio
   + CVE-2013-2907: Out of bounds read in Window.prototype
   object
   + CVE-2013-2908: Address bar spoofing related to the
   “204 No Content” status code
   + CVE-2013-2909: Use after free in inline-block rendering
   + CVE-2013-2910: Use-after-free in Web Audio
   + CVE-2013-2911: Use-after-free in XSLT
   + CVE-2013-2912: Use-after-free in PPAPI
   + CVE-2013-2913: Use-after-free in XML document parsing
   + CVE-2013-2914: Use after free in the Windows color
   chooser   dialog
   + CVE-2013-2915: Address bar spoofing via a malformed
   scheme
   + CVE-2013-2916: Address bar spoofing related to the “204
   No  Content” status code
   + CVE-2013-2917: Out of bounds read in Web Audio
   + CVE-2013-2918: Use-after-free in DOM
   + CVE-2013-2919: Memory corruption in V8
   + CVE-2013-2920: Out of bounds read in URL parsing
   + CVE-2013-2921: Use-after-free in resource loader
   + CVE-2013-2922: Use-after-free in template element
   + CVE-2013-2923: Various fixes from internal audits,
   fuzzing and  other initiatives
   + CVE-2013-2924: Use-after-free in ICU. Upstream bug


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.1:

      zypper in -t patch openSUSE-2013-961

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.1 (i586 x86_64):

      chromedriver-31.0.1650.57-8.2
      chromedriver-debuginfo-31.0.1650.57-8.2
      chromium-31.0.1650.57-8.2
      chromium-debuginfo-31.0.1650.57-8.2
      chromium-debugsource-31.0.1650.57-8.2
      chromium-desktop-gnome-31.0.1650.57-8.2
      chromium-desktop-kde-31.0.1650.57-8.2
      chromium-ffmpegsumo-31.0.1650.57-8.2
      chromium-ffmpegsumo-debuginfo-31.0.1650.57-8.2
      chromium-suid-helper-31.0.1650.57-8.2
      chromium-suid-helper-debuginfo-31.0.1650.57-8.2


References:

   https://www.suse.com/security/cve/CVE-2013-2906.html
   https://www.suse.com/security/cve/CVE-2013-2907.html
   https://www.suse.com/security/cve/CVE-2013-2908.html
   https://www.suse.com/security/cve/CVE-2013-2909.html
   https://www.suse.com/security/cve/CVE-2013-2910.html
   https://www.suse.com/security/cve/CVE-2013-2911.html
   https://www.suse.com/security/cve/CVE-2013-2912.html
   https://www.suse.com/security/cve/CVE-2013-2913.html
   https://www.suse.com/security/cve/CVE-2013-2914.html
   https://www.suse.com/security/cve/CVE-2013-2915.html
   https://www.suse.com/security/cve/CVE-2013-2916.html
   https://www.suse.com/security/cve/CVE-2013-2917.html
   https://www.suse.com/security/cve/CVE-2013-2918.html
   https://www.suse.com/security/cve/CVE-2013-2919.html
   https://www.suse.com/security/cve/CVE-2013-2920.html
   https://www.suse.com/security/cve/CVE-2013-2921.html
   https://www.suse.com/security/cve/CVE-2013-2922.html
   https://www.suse.com/security/cve/CVE-2013-2923.html
   https://www.suse.com/security/cve/CVE-2013-2924.html
   https://www.suse.com/security/cve/CVE-2013-2925.html
   https://www.suse.com/security/cve/CVE-2013-2926.html
   https://www.suse.com/security/cve/CVE-2013-2927.html
   https://www.suse.com/security/cve/CVE-2013-2928.html
   https://www.suse.com/security/cve/CVE-2013-2931.html
   https://www.suse.com/security/cve/CVE-2013-6621.html
   https://www.suse.com/security/cve/CVE-2013-6622.html
   https://www.suse.com/security/cve/CVE-2013-6623.html
   https://www.suse.com/security/cve/CVE-2013-6624.html
   https://www.suse.com/security/cve/CVE-2013-6625.html
   https://www.suse.com/security/cve/CVE-2013-6626.html
   https://www.suse.com/security/cve/CVE-2013-6627.html
   https://www.suse.com/security/cve/CVE-2013-6628.html
   https://www.suse.com/security/cve/CVE-2013-6629.html
   https://www.suse.com/security/cve/CVE-2013-6630.html
   https://www.suse.com/security/cve/CVE-2013-6631.html
   https://www.suse.com/security/cve/CVE-2013-6632.html

-- 

openSUSE: 2013:1861-1: important: chromium

December 12, 2013
An update that fixes 36 vulnerabilities is now available.

Description

Chromium was updated to 31.0.1650.57: Stable channel update: - Security Fixes: * CVE-2013-6632: Multiple memory corruption issues. - Update to Chromium 31.0.1650.48 Stable Channel update: - Security fixes: * CVE-2013-6621: Use after free related to speech input elements.. * CVE-2013-6622: Use after free related to media elements. * CVE-2013-6623: Out of bounds read in SVG. * CVE-2013-6624: Use after free related to “id” attribute strings. * CVE-2013-6625: Use after free in DOM ranges. * CVE-2013-6626: Address bar spoofing related to interstitial warnings. * CVE-2013-6627: Out of bounds read in HTTP parsing. * CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. * CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. * CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. * CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. * CVE-2013-6631: Use after free in libjingle. - Added patch chromium-fix-chromedriver-build.diff to fix the chromedriver build - Enable ARM build for Chromium. * Added patches chromium-arm-webrtc-fix.patch, chromium-fix-arm-icu.patch and chromium-fix-arm-sysroot.patch to resolve ARM specific build issues - Update to Chromium 30.0.1599.114 Stable Channel update: fix build for 32bit systems - Drop patch chromium-fix-chromedriver-build.diff. This is now fixed upstream - For openSUSE versions lower than 13.1, build against the in-tree libicu - Update to Chromium 30.0.1599.101 - Security Fixes: + CVE-2013-2925: Use after free in XHR + CVE-2013-2926: Use after free in editing + CVE-2013-2927: Use after free in forms. + CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives. - Update to Chromium 30.0.1599.66 - Easier searching by image - A number of new apps/extension APIs - Lots of under the hood changes for stability and performance - Security fixes: + CVE-2013-2906: Races in Web Audio + CVE-2013-2907: Out of bounds read in Window.prototype object + CVE-2013-2908: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2909: Use after free in inline-block rendering + CVE-2013-2910: Use-after-free in Web Audio + CVE-2013-2911: Use-after-free in XSLT + CVE-2013-2912: Use-after-free in PPAPI + CVE-2013-2913: Use-after-free in XML document parsing + CVE-2013-2914: Use after free in the Windows color chooser dialog + CVE-2013-2915: Address bar spoofing via a malformed scheme + CVE-2013-2916: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2917: Out of bounds read in Web Audio + CVE-2013-2918: Use-after-free in DOM + CVE-2013-2919: Memory corruption in V8 + CVE-2013-2920: Out of bounds read in URL parsing + CVE-2013-2921: Use-after-free in resource loader + CVE-2013-2922: Use-after-free in template element + CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives + CVE-2013-2924: Use-after-free in ICU. Upstream bug

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2013-961 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 13.1 (i586 x86_64): chromedriver-31.0.1650.57-8.2 chromedriver-debuginfo-31.0.1650.57-8.2 chromium-31.0.1650.57-8.2 chromium-debuginfo-31.0.1650.57-8.2 chromium-debugsource-31.0.1650.57-8.2 chromium-desktop-gnome-31.0.1650.57-8.2 chromium-desktop-kde-31.0.1650.57-8.2 chromium-ffmpegsumo-31.0.1650.57-8.2 chromium-ffmpegsumo-debuginfo-31.0.1650.57-8.2 chromium-suid-helper-31.0.1650.57-8.2 chromium-suid-helper-debuginfo-31.0.1650.57-8.2


References

https://www.suse.com/security/cve/CVE-2013-2906.html https://www.suse.com/security/cve/CVE-2013-2907.html https://www.suse.com/security/cve/CVE-2013-2908.html https://www.suse.com/security/cve/CVE-2013-2909.html https://www.suse.com/security/cve/CVE-2013-2910.html https://www.suse.com/security/cve/CVE-2013-2911.html https://www.suse.com/security/cve/CVE-2013-2912.html https://www.suse.com/security/cve/CVE-2013-2913.html https://www.suse.com/security/cve/CVE-2013-2914.html https://www.suse.com/security/cve/CVE-2013-2915.html https://www.suse.com/security/cve/CVE-2013-2916.html https://www.suse.com/security/cve/CVE-2013-2917.html https://www.suse.com/security/cve/CVE-2013-2918.html https://www.suse.com/security/cve/CVE-2013-2919.html https://www.suse.com/security/cve/CVE-2013-2920.html https://www.suse.com/security/cve/CVE-2013-2921.html https://www.suse.com/security/cve/CVE-2013-2922.html https://www.suse.com/security/cve/CVE-2013-2923.html https://www.suse.com/security/cve/CVE-2013-2924.html https://www.suse.com/security/cve/CVE-2013-2925.html https://www.suse.com/security/cve/CVE-2013-2926.html https://www.suse.com/security/cve/CVE-2013-2927.html https://www.suse.com/security/cve/CVE-2013-2928.html https://www.suse.com/security/cve/CVE-2013-2931.html https://www.suse.com/security/cve/CVE-2013-6621.html https://www.suse.com/security/cve/CVE-2013-6622.html https://www.suse.com/security/cve/CVE-2013-6623.html https://www.suse.com/security/cve/CVE-2013-6624.html https://www.suse.com/security/cve/CVE-2013-6625.html https://www.suse.com/security/cve/CVE-2013-6626.html https://www.suse.com/security/cve/CVE-2013-6627.html https://www.suse.com/security/cve/CVE-2013-6628.html https://www.suse.com/security/cve/CVE-2013-6629.html https://www.suse.com/security/cve/CVE-2013-6630.html https://www.suse.com/security/cve/CVE-2013-6631.html https://www.suse.com/security/cve/CVE-2013-6632.html--


Severity
Announcement ID: openSUSE-SU-2013:1861-1
Rating: important
Affected Products: openSUSE 13.1

Related News