openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:1484-1
Rating:             important
References:         #1095163 
Cross-References:   CVE-2018-6123 CVE-2018-6124 CVE-2018-6125
                    CVE-2018-6126 CVE-2018-6127 CVE-2018-6128
                    CVE-2018-6129 CVE-2018-6130 CVE-2018-6131
                    CVE-2018-6132 CVE-2018-6133 CVE-2018-6134
                    CVE-2018-6135 CVE-2018-6136 CVE-2018-6137
                    CVE-2018-6138 CVE-2018-6139 CVE-2018-6140
                    CVE-2018-6141 CVE-2018-6142 CVE-2018-6143
                    CVE-2018-6144 CVE-2018-6145 CVE-2018-6147
                   
Affected Products:
                    openSUSE Leap 42.3
                    openSUSE Leap 15.0
______________________________________________________________________________

   An update that fixes 24 vulnerabilities is now available.

Description:

   This update for chromium to version 66.0.3359.181 fixes the following
   issues:

   The following security issues were fixed (boo#1095163):

   * CVE-2018-6123: Use after free in Blink.
   * CVE-2018-6124: Type confusion in Blink.
   * CVE-2018-6125: Overly permissive policy in WebUSB.
   * CVE-2018-6126: Heap buffer overflow in Skia.
   * CVE-2018-6127: Use after free in indexedDB.
   * CVE-2018-6128: uXSS in Chrome on iOS.
   * CVE-2018-6129: Out of bounds memory access in WebRTC.
   * CVE-2018-6130: Out of bounds memory access in WebRTC.
   * CVE-2018-6131: Incorrect mutability protection in WebAssembly.
   * CVE-2018-6132: Use of uninitialized memory in WebRTC.
   * CVE-2018-6133: URL spoof in Omnibox.
   * CVE-2018-6134: Referrer Policy bypass in Blink.
   * CVE-2018-6135: UI spoofing in Blink.
   * CVE-2018-6136: Out of bounds memory access in V8.
   * CVE-2018-6137: Leak of visited status of page in Blink.
   * CVE-2018-6138: Overly permissive policy in Extensions.
   * CVE-2018-6139: Restrictions bypass in the debugger extension API.
   * CVE-2018-6140: Restrictions bypass in the debugger extension API.
   * CVE-2018-6141: Heap buffer overflow in Skia.
   * CVE-2018-6142: Out of bounds memory access in V8.
   * CVE-2018-6143: Out of bounds memory access in V8.
   * CVE-2018-6144: Out of bounds memory access in PDFium.
   * CVE-2018-6145: Incorrect escaping of MathML in Blink.
   * CVE-2018-6147: Password fields not taking advantage of OS protections in
     Views.

   Additional changes:

   * Autoplay: Force enable on desktop for Web Audio

   This update enables the "Strict site isolation" feature for a larger
   percentage of users. This feature is a mitigation against the Spectre
   vulnerabilities. It can be turned on via:
   chrome://flags/#enable-site-per-process It can be disabled via:
   chrome://flags/#site-isolation-trial-opt-out


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.3:

      zypper in -t patch openSUSE-2018-546=1

   - openSUSE Leap 15.0:

      zypper in -t patch openSUSE-2018-546=1



Package List:

   - openSUSE Leap 42.3 (x86_64):

      chromedriver-67.0.3396.62-161.1
      chromedriver-debuginfo-67.0.3396.62-161.1
      chromium-67.0.3396.62-161.1
      chromium-debuginfo-67.0.3396.62-161.1
      chromium-debugsource-67.0.3396.62-161.1

   - openSUSE Leap 15.0 (x86_64):

      chromedriver-67.0.3396.62-lp150.2.3.1
      chromedriver-debuginfo-67.0.3396.62-lp150.2.3.1
      chromium-67.0.3396.62-lp150.2.3.1
      chromium-debuginfo-67.0.3396.62-lp150.2.3.1
      chromium-debugsource-67.0.3396.62-lp150.2.3.1


References:

   https://www.suse.com/security/cve/CVE-2018-6123.html
   https://www.suse.com/security/cve/CVE-2018-6124.html
   https://www.suse.com/security/cve/CVE-2018-6125.html
   https://www.suse.com/security/cve/CVE-2018-6126.html
   https://www.suse.com/security/cve/CVE-2018-6127.html
   https://www.suse.com/security/cve/CVE-2018-6128.html
   https://www.suse.com/security/cve/CVE-2018-6129.html
   https://www.suse.com/security/cve/CVE-2018-6130.html
   https://www.suse.com/security/cve/CVE-2018-6131.html
   https://www.suse.com/security/cve/CVE-2018-6132.html
   https://www.suse.com/security/cve/CVE-2018-6133.html
   https://www.suse.com/security/cve/CVE-2018-6134.html
   https://www.suse.com/security/cve/CVE-2018-6135.html
   https://www.suse.com/security/cve/CVE-2018-6136.html
   https://www.suse.com/security/cve/CVE-2018-6137.html
   https://www.suse.com/security/cve/CVE-2018-6138.html
   https://www.suse.com/security/cve/CVE-2018-6139.html
   https://www.suse.com/security/cve/CVE-2018-6140.html
   https://www.suse.com/security/cve/CVE-2018-6141.html
   https://www.suse.com/security/cve/CVE-2018-6142.html
   https://www.suse.com/security/cve/CVE-2018-6143.html
   https://www.suse.com/security/cve/CVE-2018-6144.html
   https://www.suse.com/security/cve/CVE-2018-6145.html
   https://www.suse.com/security/cve/CVE-2018-6147.html
   https://bugzilla.suse.com/1095163

-- 

openSUSE: 2018:1484-1: important: chromium

June 1, 2018
An update that fixes 24 vulnerabilities is now available.

Description

This update for chromium to version 66.0.3359.181 fixes the following issues: The following security issues were fixed (boo#1095163): * CVE-2018-6123: Use after free in Blink. * CVE-2018-6124: Type confusion in Blink. * CVE-2018-6125: Overly permissive policy in WebUSB. * CVE-2018-6126: Heap buffer overflow in Skia. * CVE-2018-6127: Use after free in indexedDB. * CVE-2018-6128: uXSS in Chrome on iOS. * CVE-2018-6129: Out of bounds memory access in WebRTC. * CVE-2018-6130: Out of bounds memory access in WebRTC. * CVE-2018-6131: Incorrect mutability protection in WebAssembly. * CVE-2018-6132: Use of uninitialized memory in WebRTC. * CVE-2018-6133: URL spoof in Omnibox. * CVE-2018-6134: Referrer Policy bypass in Blink. * CVE-2018-6135: UI spoofing in Blink. * CVE-2018-6136: Out of bounds memory access in V8. * CVE-2018-6137: Leak of visited status of page in Blink. * CVE-2018-6138: Overly permissive policy in Extensions. * CVE-2018-6139: Restrictions bypass in the debugger extension API. * CVE-2018-6140: Restrictions bypass in the debugger extension API. * CVE-2018-6141: Heap buffer overflow in Skia. * CVE-2018-6142: Out of bounds memory access in V8. * CVE-2018-6143: Out of bounds memory access in V8. * CVE-2018-6144: Out of bounds memory access in PDFium. * CVE-2018-6145: Incorrect escaping of MathML in Blink. * CVE-2018-6147: Password fields not taking advantage of OS protections in Views. Additional changes: * Autoplay: Force enable on desktop for Web Audio This update enables the "Strict site isolation" feature for a larger percentage of users. This feature is a mitigation against the Spectre vulnerabilities. It can be turned on via: chrome://flags/#enable-site-per-process It can be disabled via: chrome://flags/#site-isolation-trial-opt-out

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-546=1 - openSUSE Leap 15.0: zypper in -t patch openSUSE-2018-546=1


Package List

- openSUSE Leap 42.3 (x86_64): chromedriver-67.0.3396.62-161.1 chromedriver-debuginfo-67.0.3396.62-161.1 chromium-67.0.3396.62-161.1 chromium-debuginfo-67.0.3396.62-161.1 chromium-debugsource-67.0.3396.62-161.1 - openSUSE Leap 15.0 (x86_64): chromedriver-67.0.3396.62-lp150.2.3.1 chromedriver-debuginfo-67.0.3396.62-lp150.2.3.1 chromium-67.0.3396.62-lp150.2.3.1 chromium-debuginfo-67.0.3396.62-lp150.2.3.1 chromium-debugsource-67.0.3396.62-lp150.2.3.1


References

https://www.suse.com/security/cve/CVE-2018-6123.html https://www.suse.com/security/cve/CVE-2018-6124.html https://www.suse.com/security/cve/CVE-2018-6125.html https://www.suse.com/security/cve/CVE-2018-6126.html https://www.suse.com/security/cve/CVE-2018-6127.html https://www.suse.com/security/cve/CVE-2018-6128.html https://www.suse.com/security/cve/CVE-2018-6129.html https://www.suse.com/security/cve/CVE-2018-6130.html https://www.suse.com/security/cve/CVE-2018-6131.html https://www.suse.com/security/cve/CVE-2018-6132.html https://www.suse.com/security/cve/CVE-2018-6133.html https://www.suse.com/security/cve/CVE-2018-6134.html https://www.suse.com/security/cve/CVE-2018-6135.html https://www.suse.com/security/cve/CVE-2018-6136.html https://www.suse.com/security/cve/CVE-2018-6137.html https://www.suse.com/security/cve/CVE-2018-6138.html https://www.suse.com/security/cve/CVE-2018-6139.html https://www.suse.com/security/cve/CVE-2018-6140.html https://www.suse.com/security/cve/CVE-2018-6141.html https://www.suse.com/security/cve/CVE-2018-6142.html https://www.suse.com/security/cve/CVE-2018-6143.html https://www.suse.com/security/cve/CVE-2018-6144.html https://www.suse.com/security/cve/CVE-2018-6145.html https://www.suse.com/security/cve/CVE-2018-6147.html https://bugzilla.suse.com/1095163--


Severity
Announcement ID: openSUSE-SU-2018:1484-1
Rating: important
Affected Products: openSUSE Leap 42.3 openSUSE Leap 15.0

Related News