openSUSE Security Update: Security update for chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1501-1 Rating: important References: #1042833 Cross-References: CVE-2017-5070 CVE-2017-5071 CVE-2017-5072 CVE-2017-5073 CVE-2017-5074 CVE-2017-5075 CVE-2017-5076 CVE-2017-5077 CVE-2017-5078 CVE-2017-5079 CVE-2017-5080 CVE-2017-5081 CVE-2017-5082 CVE-2017-5083 CVE-2017-5085 CVE-2017-5086 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes 16 vulnerabilities is now available. Description: This update to Chromium 59.0.3071.86 fixes the following security issues: - CVE-2017-5070: Type confusion in V8 - CVE-2017-5071: Out of bounds read in V8 - CVE-2017-5072: Address spoofing in Omnibox - CVE-2017-5073: Use after free in print preview - CVE-2017-5074: Use after free in Apps Bluetooth - CVE-2017-5075: Information leak in CSP reporting - CVE-2017-5086: Address spoofing in Omnibox - CVE-2017-5076: Address spoofing in Omnibox - CVE-2017-5077: Heap buffer overflow in Skia - CVE-2017-5078: Possible command injection in mailto handling - CVE-2017-5079: UI spoofing in Blink - CVE-2017-5080: Use after free in credit card autofill - CVE-2017-5081: Extension verification bypass - CVE-2017-5082: Insufficient hardening in credit card editor - CVE-2017-5083: UI spoofing in Blink - CVE-2017-5085: Inappropriate javascript execution on WebUI pages Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2017-661=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): chromedriver-59.0.3071.86-20.1 chromedriver-debuginfo-59.0.3071.86-20.1 chromium-59.0.3071.86-20.1 chromium-debuginfo-59.0.3071.86-20.1 chromium-debugsource-59.0.3071.86-20.1 References: https://www.suse.com/security/cve/CVE-2017-5070.html https://www.suse.com/security/cve/CVE-2017-5071.html https://www.suse.com/security/cve/CVE-2017-5072.html https://www.suse.com/security/cve/CVE-2017-5073.html https://www.suse.com/security/cve/CVE-2017-5074.html https://www.suse.com/security/cve/CVE-2017-5075.html https://www.suse.com/security/cve/CVE-2017-5076.html https://www.suse.com/security/cve/CVE-2017-5077.html https://www.suse.com/security/cve/CVE-2017-5078.html https://www.suse.com/security/cve/CVE-2017-5079.html https://www.suse.com/security/cve/CVE-2017-5080.html https://www.suse.com/security/cve/CVE-2017-5081.html https://www.suse.com/security/cve/CVE-2017-5082.html https://www.suse.com/security/cve/CVE-2017-5083.html https://www.suse.com/security/cve/CVE-2017-5085.html https://www.suse.com/security/cve/CVE-2017-5086.html https://bugzilla.suse.com/1042833 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org