openSUSE Security Update: Security update for chromium

Announcement ID:    openSUSE-SU-2021:1144-1
Rating:             important
References:         #1188590 #1189006 
Cross-References:   CVE-2021-30565 CVE-2021-30566 CVE-2021-30567
                    CVE-2021-30568 CVE-2021-30569 CVE-2021-30571
                    CVE-2021-30572 CVE-2021-30573 CVE-2021-30574
                    CVE-2021-30575 CVE-2021-30576 CVE-2021-30577
                    CVE-2021-30578 CVE-2021-30579 CVE-2021-30581
                    CVE-2021-30582 CVE-2021-30584 CVE-2021-30585
                    CVE-2021-30588 CVE-2021-30589 CVE-2021-30590
                    CVE-2021-30591 CVE-2021-30592 CVE-2021-30593
                    CVE-2021-30594 CVE-2021-30596 CVE-2021-30597
Affected Products:
                    openSUSE Backports SLE-15-SP3

   An update that fixes 27 vulnerabilities is now available.


   This update for chromium fixes the following issues:

   Chromium 92.0.4515.131 (boo#1189006)

   * CVE-2021-30590: Heap buffer overflow in Bookmarks
   * CVE-2021-30591: Use after free in File System API
   * CVE-2021-30592: Out of bounds write in Tab Groups
   * CVE-2021-30593: Out of bounds read in Tab Strip
   * CVE-2021-30594: Use after free in Page Info UI
   * CVE-2021-30596: Incorrect security UI in Navigation
   * CVE-2021-30597: Use after free in Browser UI

   Chromium 92.0.4515.107 (boo#1188590)

   * CVE-2021-30565: Out of bounds write in Tab Groups
   * CVE-2021-30566: Stack buffer overflow in Printing
   * CVE-2021-30567: Use after free in DevTools
   * CVE-2021-30568: Heap buffer overflow in WebGL
   * CVE-2021-30569: Use after free in sqlite
   * CVE-2021-30571: Insufficient policy enforcement in DevTools
   * CVE-2021-30572: Use after free in Autofill
   * CVE-2021-30573: Use after free in GPU
   * CVE-2021-30574: Use after free in protocol handling
   * CVE-2021-30575: Out of bounds read in Autofill
   * CVE-2021-30576: Use after free in DevTools
   * CVE-2021-30577: Insufficient policy enforcement in Installer
   * CVE-2021-30578: Uninitialized Use in Media
   * CVE-2021-30579: Use after free in UI framework
   * CVE-2021-30581: Use after free in DevTools
   * CVE-2021-30582: Inappropriate implementation in Animation
   * CVE-2021-30584: Incorrect security UI in Downloads
   * CVE-2021-30585: Use after free in sensor handling
   * CVE-2021-30588: Type Confusion in V8
   * CVE-2021-30589: Insufficient validation of untrusted input in Sharing

Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP3:

      zypper in -t patch openSUSE-2021-1144=1

Package List:

   - openSUSE Backports SLE-15-SP3 (aarch64 x86_64):