Mailinglist Archive: opensuse-updates (101 mails)

< Previous Next >
openSUSE-SU-2012:1376-1: important: update for chromium
openSUSE Security Update: update for chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2012:1376-1
Rating: important
References: #782257
Cross-References: CVE-2012-2874 CVE-2012-2876 CVE-2012-2877
CVE-2012-2878 CVE-2012-2879 CVE-2012-2880
CVE-2012-2881 CVE-2012-2882 CVE-2012-2883
CVE-2012-2884 CVE-2012-2885 CVE-2012-2886
CVE-2012-2887 CVE-2012-2888 CVE-2012-2889
CVE-2012-2891 CVE-2012-2892 CVE-2012-2893
CVE-2012-2894 CVE-2012-2896
Affected Products:
openSUSE 12.2
openSUSE 12.1
______________________________________________________________________________

An update that fixes 20 vulnerabilities is now available.

Description:

Chromium was upgraded to version 24.0.1290 which fixed
multiple security flaws.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.2:

zypper in -t patch openSUSE-2012-721

- openSUSE 12.1:

zypper in -t patch openSUSE-2012-721

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.2 (i586 x86_64):

chromedriver-24.0.1290.0-1.19.1
chromedriver-debuginfo-24.0.1290.0-1.19.1
chromium-24.0.1290.0-1.19.1
chromium-debuginfo-24.0.1290.0-1.19.1
chromium-debugsource-24.0.1290.0-1.19.1
chromium-desktop-gnome-24.0.1290.0-1.19.1
chromium-desktop-kde-24.0.1290.0-1.19.1
chromium-suid-helper-24.0.1290.0-1.19.1
chromium-suid-helper-debuginfo-24.0.1290.0-1.19.1

- openSUSE 12.1 (i586 x86_64):

chromedriver-24.0.1290.0-1.39.1
chromedriver-debuginfo-24.0.1290.0-1.39.1
chromium-24.0.1290.0-1.39.1
chromium-debuginfo-24.0.1290.0-1.39.1
chromium-debugsource-24.0.1290.0-1.39.1
chromium-desktop-gnome-24.0.1290.0-1.39.1
chromium-desktop-kde-24.0.1290.0-1.39.1
chromium-suid-helper-24.0.1290.0-1.39.1
chromium-suid-helper-debuginfo-24.0.1290.0-1.39.1


References:

http://support.novell.com/security/cve/CVE-2012-2874.html
http://support.novell.com/security/cve/CVE-2012-2876.html
http://support.novell.com/security/cve/CVE-2012-2877.html
http://support.novell.com/security/cve/CVE-2012-2878.html
http://support.novell.com/security/cve/CVE-2012-2879.html
http://support.novell.com/security/cve/CVE-2012-2880.html
http://support.novell.com/security/cve/CVE-2012-2881.html
http://support.novell.com/security/cve/CVE-2012-2882.html
http://support.novell.com/security/cve/CVE-2012-2883.html
http://support.novell.com/security/cve/CVE-2012-2884.html
http://support.novell.com/security/cve/CVE-2012-2885.html
http://support.novell.com/security/cve/CVE-2012-2886.html
http://support.novell.com/security/cve/CVE-2012-2887.html
http://support.novell.com/security/cve/CVE-2012-2888.html
http://support.novell.com/security/cve/CVE-2012-2889.html
http://support.novell.com/security/cve/CVE-2012-2891.html
http://support.novell.com/security/cve/CVE-2012-2892.html
http://support.novell.com/security/cve/CVE-2012-2893.html
http://support.novell.com/security/cve/CVE-2012-2894.html
http://support.novell.com/security/cve/CVE-2012-2896.html
https://bugzilla.novell.com/782257


< Previous Next >
This Thread
  • No further messages