openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:0186-1
Rating:             important
References:         #1181137 
Cross-References:   CVE-2020-16044 CVE-2021-21117 CVE-2021-21118
                    CVE-2021-21119 CVE-2021-21120 CVE-2021-21121
                    CVE-2021-21122 CVE-2021-21123 CVE-2021-21124
                    CVE-2021-21125 CVE-2021-21126 CVE-2021-21127
                    CVE-2021-21128 CVE-2021-21129 CVE-2021-21130
                    CVE-2021-21131 CVE-2021-21132 CVE-2021-21133
                    CVE-2021-21134 CVE-2021-21135 CVE-2021-21136
                    CVE-2021-21137 CVE-2021-21138 CVE-2021-21139
                    CVE-2021-21140 CVE-2021-21141
Affected Products:
                    openSUSE Backports SLE-15-SP2
______________________________________________________________________________

   An update that fixes 26 vulnerabilities is now available.

Description:

   This update for chromium fixes the following issues:

   chromium was updated to 88.0.4324.96 boo#1181137

   - CVE-2021-21117: Insufficient policy enforcement in Cryptohome
   - CVE-2021-21118: Insufficient data validation in V8
   - CVE-2021-21119: Use after free in Media
   - CVE-2021-21120: Use after free in WebSQL
   - CVE-2021-21121: Use after free in Omnibox
   - CVE-2021-21122: Use after free in Blink
   - CVE-2021-21123: Insufficient data validation in File System API
   - CVE-2021-21124: Potential user after free in Speech Recognizer
   - CVE-2021-21125: Insufficient policy enforcement in File System API
   - CVE-2020-16044: Use after free in WebRTC
   - CVE-2021-21126: Insufficient policy enforcement in extensions
   - CVE-2021-21127: Insufficient policy enforcement in extensions
   - CVE-2021-21128: Heap buffer overflow in Blink
   - CVE-2021-21129: Insufficient policy enforcement in File System API
   - CVE-2021-21130: Insufficient policy enforcement in File System API
   - CVE-2021-21131: Insufficient policy enforcement in File System API
   - CVE-2021-21132: Inappropriate implementation in DevTools
   - CVE-2021-21133: Insufficient policy enforcement in Downloads
   - CVE-2021-21134: Incorrect security UI in Page Info
   - CVE-2021-21135: Inappropriate implementation in Performance API
   - CVE-2021-21136: Insufficient policy enforcement in WebView
   - CVE-2021-21137: Inappropriate implementation in DevTools
   - CVE-2021-21138: Use after free in DevTools
   - CVE-2021-21139: Inappropriate implementation in iframe sandbox
   - CVE-2021-21140: Uninitialized Use in USB
   - CVE-2021-21141: Insufficient policy enforcement in File System API

   This update was imported from the openSUSE:Leap:15.2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP2:

      zypper in -t patch openSUSE-2021-186=1



Package List:

   - openSUSE Backports SLE-15-SP2 (aarch64 x86_64):

      chromedriver-88.0.4324.96-bp152.2.53.1
      chromium-88.0.4324.96-bp152.2.53.1


References:

   https://www.suse.com/security/cve/CVE-2020-16044.html
   https://www.suse.com/security/cve/CVE-2021-21117.html
   https://www.suse.com/security/cve/CVE-2021-21118.html
   https://www.suse.com/security/cve/CVE-2021-21119.html
   https://www.suse.com/security/cve/CVE-2021-21120.html
   https://www.suse.com/security/cve/CVE-2021-21121.html
   https://www.suse.com/security/cve/CVE-2021-21122.html
   https://www.suse.com/security/cve/CVE-2021-21123.html
   https://www.suse.com/security/cve/CVE-2021-21124.html
   https://www.suse.com/security/cve/CVE-2021-21125.html
   https://www.suse.com/security/cve/CVE-2021-21126.html
   https://www.suse.com/security/cve/CVE-2021-21127.html
   https://www.suse.com/security/cve/CVE-2021-21128.html
   https://www.suse.com/security/cve/CVE-2021-21129.html
   https://www.suse.com/security/cve/CVE-2021-21130.html
   https://www.suse.com/security/cve/CVE-2021-21131.html
   https://www.suse.com/security/cve/CVE-2021-21132.html
   https://www.suse.com/security/cve/CVE-2021-21133.html
   https://www.suse.com/security/cve/CVE-2021-21134.html
   https://www.suse.com/security/cve/CVE-2021-21135.html
   https://www.suse.com/security/cve/CVE-2021-21136.html
   https://www.suse.com/security/cve/CVE-2021-21137.html
   https://www.suse.com/security/cve/CVE-2021-21138.html
   https://www.suse.com/security/cve/CVE-2021-21139.html
   https://www.suse.com/security/cve/CVE-2021-21140.html
   https://www.suse.com/security/cve/CVE-2021-21141.html
   https://bugzilla.suse.com/1181137