openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2021:1350-1
Rating:             important
References:         #1190765 #1191166 #1191204 #1191463 
Cross-References:   CVE-2021-37956 CVE-2021-37957 CVE-2021-37958
                    CVE-2021-37959 CVE-2021-37960 CVE-2021-37961
                    CVE-2021-37962 CVE-2021-37963 CVE-2021-37964
                    CVE-2021-37965 CVE-2021-37966 CVE-2021-37967
                    CVE-2021-37968 CVE-2021-37969 CVE-2021-37970
                    CVE-2021-37971 CVE-2021-37972 CVE-2021-37973
                    CVE-2021-37974 CVE-2021-37975 CVE-2021-37976
                    CVE-2021-37977 CVE-2021-37978 CVE-2021-37979
                    CVE-2021-37980
Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes 25 vulnerabilities is now available.

Description:

   This update for chromium fixes the following issues:

   Chromium 94.0.4606.81 (boo#1191463):

   * CVE-2021-37977: Use after free in Garbage Collection
   * CVE-2021-37978: Heap buffer overflow in Blink
   * CVE-2021-37979: Heap buffer overflow in WebRTC
   * CVE-2021-37980: Inappropriate implementation in Sandbox

   Chromium 94.0.4606.54 (boo#1190765):

   * CVE-2021-37956: Use after free in Offline use
   * CVE-2021-37957: Use after free in WebGPU
   * CVE-2021-37958: Inappropriate implementation in Navigation
   * CVE-2021-37959: Use after free in Task Manager
   * CVE-2021-37960: Inappropriate implementation in Blink graphics
   * CVE-2021-37961: Use after free in Tab Strip
   * CVE-2021-37962: Use after free in Performance Manager
   * CVE-2021-37963: Side-channel information leakage in DevTools
   * CVE-2021-37964: Inappropriate implementation in ChromeOS Networking
   * CVE-2021-37965: Inappropriate implementation in Background Fetch API
   * CVE-2021-37966: Inappropriate implementation in Compositing
   * CVE-2021-37967: Inappropriate implementation in Background Fetch API
   * CVE-2021-37968: Inappropriate implementation in Background Fetch API
   * CVE-2021-37969: Inappropriate implementation in Google Updater
   * CVE-2021-37970: Use after free in File System API
   * CVE-2021-37971: Incorrect security UI in Web Browser UI
   * CVE-2021-37972: Out of bounds read in libjpeg-turbo

   Chromium 94.0.4606.61 (boo#1191166):

   * CVE-2021-37973: Use after free in Portals

   Chromium 94.0.4606.71 (boo#1191204):

   * CVE-2021-37974 : Use after free in Safe Browsing
   * CVE-2021-37975 : Use after free in V8
   * CVE-2021-37976 : Information leak in core


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-1350=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      chromedriver-94.0.4606.81-lp152.2.132.1
      chromedriver-debuginfo-94.0.4606.81-lp152.2.132.1
      chromium-94.0.4606.81-lp152.2.132.1
      chromium-debuginfo-94.0.4606.81-lp152.2.132.1


References:

   https://www.suse.com/security/cve/CVE-2021-37956.html
   https://www.suse.com/security/cve/CVE-2021-37957.html
   https://www.suse.com/security/cve/CVE-2021-37958.html
   https://www.suse.com/security/cve/CVE-2021-37959.html
   https://www.suse.com/security/cve/CVE-2021-37960.html
   https://www.suse.com/security/cve/CVE-2021-37961.html
   https://www.suse.com/security/cve/CVE-2021-37962.html
   https://www.suse.com/security/cve/CVE-2021-37963.html
   https://www.suse.com/security/cve/CVE-2021-37964.html
   https://www.suse.com/security/cve/CVE-2021-37965.html
   https://www.suse.com/security/cve/CVE-2021-37966.html
   https://www.suse.com/security/cve/CVE-2021-37967.html
   https://www.suse.com/security/cve/CVE-2021-37968.html
   https://www.suse.com/security/cve/CVE-2021-37969.html
   https://www.suse.com/security/cve/CVE-2021-37970.html
   https://www.suse.com/security/cve/CVE-2021-37971.html
   https://www.suse.com/security/cve/CVE-2021-37972.html
   https://www.suse.com/security/cve/CVE-2021-37973.html
   https://www.suse.com/security/cve/CVE-2021-37974.html
   https://www.suse.com/security/cve/CVE-2021-37975.html
   https://www.suse.com/security/cve/CVE-2021-37976.html
   https://www.suse.com/security/cve/CVE-2021-37977.html
   https://www.suse.com/security/cve/CVE-2021-37978.html
   https://www.suse.com/security/cve/CVE-2021-37979.html
   https://www.suse.com/security/cve/CVE-2021-37980.html
   https://bugzilla.suse.com/1190765
   https://bugzilla.suse.com/1191166
   https://bugzilla.suse.com/1191204
   https://bugzilla.suse.com/1191463