openSUSE Security Update: Security update for chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2021:1131-1 Rating: important References: #1188590 #1189006 Cross-References: CVE-2021-30565 CVE-2021-30566 CVE-2021-30567 CVE-2021-30568 CVE-2021-30569 CVE-2021-30571 CVE-2021-30572 CVE-2021-30573 CVE-2021-30574 CVE-2021-30575 CVE-2021-30576 CVE-2021-30577 CVE-2021-30578 CVE-2021-30579 CVE-2021-30581 CVE-2021-30582 CVE-2021-30584 CVE-2021-30585 CVE-2021-30588 CVE-2021-30589 CVE-2021-30590 CVE-2021-30591 CVE-2021-30592 CVE-2021-30593 CVE-2021-30594 CVE-2021-30596 CVE-2021-30597 Affected Products: openSUSE Leap 15.2 ______________________________________________________________________________ An update that fixes 27 vulnerabilities is now available. Description: This update for chromium fixes the following issues: Chromium 92.0.4515.131 (boo#1189006) * CVE-2021-30590: Heap buffer overflow in Bookmarks * CVE-2021-30591: Use after free in File System API * CVE-2021-30592: Out of bounds write in Tab Groups * CVE-2021-30593: Out of bounds read in Tab Strip * CVE-2021-30594: Use after free in Page Info UI * CVE-2021-30596: Incorrect security UI in Navigation * CVE-2021-30597: Use after free in Browser UI Chromium 92.0.4515.107 (boo#1188590) * CVE-2021-30565: Out of bounds write in Tab Groups * CVE-2021-30566: Stack buffer overflow in Printing * CVE-2021-30567: Use after free in DevTools * CVE-2021-30568: Heap buffer overflow in WebGL * CVE-2021-30569: Use after free in sqlite * CVE-2021-30571: Insufficient policy enforcement in DevTools * CVE-2021-30572: Use after free in Autofill * CVE-2021-30573: Use after free in GPU * CVE-2021-30574: Use after free in protocol handling * CVE-2021-30575: Out of bounds read in Autofill * CVE-2021-30576: Use after free in DevTools * CVE-2021-30577: Insufficient policy enforcement in Installer * CVE-2021-30578: Uninitialized Use in Media * CVE-2021-30579: Use after free in UI framework * CVE-2021-30581: Use after free in DevTools * CVE-2021-30582: Inappropriate implementation in Animation * CVE-2021-30584: Incorrect security UI in Downloads * CVE-2021-30585: Use after free in sensor handling * CVE-2021-30588: Type Confusion in V8 * CVE-2021-30589: Insufficient validation of untrusted input in Sharing Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2021-1131=1 Package List: - openSUSE Leap 15.2 (x86_64): chromedriver-92.0.4515.131-lp152.2.116.1 chromedriver-debuginfo-92.0.4515.131-lp152.2.116.1 chromium-92.0.4515.131-lp152.2.116.1 chromium-debuginfo-92.0.4515.131-lp152.2.116.1 References: https://www.suse.com/security/cve/CVE-2021-30565.html https://www.suse.com/security/cve/CVE-2021-30566.html https://www.suse.com/security/cve/CVE-2021-30567.html https://www.suse.com/security/cve/CVE-2021-30568.html https://www.suse.com/security/cve/CVE-2021-30569.html https://www.suse.com/security/cve/CVE-2021-30571.html https://www.suse.com/security/cve/CVE-2021-30572.html https://www.suse.com/security/cve/CVE-2021-30573.html https://www.suse.com/security/cve/CVE-2021-30574.html https://www.suse.com/security/cve/CVE-2021-30575.html https://www.suse.com/security/cve/CVE-2021-30576.html https://www.suse.com/security/cve/CVE-2021-30577.html https://www.suse.com/security/cve/CVE-2021-30578.html https://www.suse.com/security/cve/CVE-2021-30579.html https://www.suse.com/security/cve/CVE-2021-30581.html https://www.suse.com/security/cve/CVE-2021-30582.html https://www.suse.com/security/cve/CVE-2021-30584.html https://www.suse.com/security/cve/CVE-2021-30585.html https://www.suse.com/security/cve/CVE-2021-30588.html https://www.suse.com/security/cve/CVE-2021-30589.html https://www.suse.com/security/cve/CVE-2021-30590.html https://www.suse.com/security/cve/CVE-2021-30591.html https://www.suse.com/security/cve/CVE-2021-30592.html https://www.suse.com/security/cve/CVE-2021-30593.html https://www.suse.com/security/cve/CVE-2021-30594.html https://www.suse.com/security/cve/CVE-2021-30596.html https://www.suse.com/security/cve/CVE-2021-30597.html https://bugzilla.suse.com/1188590 https://bugzilla.suse.com/1189006