openSUSE-SU-2024:0084-1: important: Security update for chromium
openSUSE Security Update: Security update for chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2024:0084-1 Rating: important References: #1220131 #1220604 #1221105 #1221335 Cross-References: CVE-2024-1669 CVE-2024-1670 CVE-2024-1671 CVE-2024-1672 CVE-2024-1673 CVE-2024-1674 CVE-2024-1675 CVE-2024-1676 CVE-2024-2173 CVE-2024-2174 CVE-2024-2176 CVE-2024-2400 Affected Products: openSUSE Backports SLE-15-SP5 ______________________________________________________________________________ An update that fixes 12 vulnerabilities is now available. Description: This update for chromium fixes the following issue: Chromium 122.0.6261.128 (boo#1221335) * CVE-2024-2400: Use after free in Performance Manager Chromium 122.0.6261.111 (boo#1220131,boo#1220604,boo#1221105) * New upstream security release. * CVE-2024-2173: Out of bounds memory access in V8. * CVE-2024-2174: Inappropriate implementation in V8. * CVE-2024-2176: Use after free in FedCM. Chromium 122.0.6261.94 * CVE-2024-1669: Out of bounds memory access in Blink. * CVE-2024-1670: Use after free in Mojo. * CVE-2024-1671: Inappropriate implementation in Site Isolation. * CVE-2024-1672: Inappropriate implementation in Content Security Policy. * CVE-2024-1673: Use after free in Accessibility. * CVE-2024-1674: Inappropriate implementation in Navigation. * CVE-2024-1675: Insufficient policy enforcement in Download. * CVE-2024-1676: Inappropriate implementation in Navigation. * Type Confusion in V8 Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2024-84=1 Package List: - openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64): clang17-17.0.6-bp155.2.2 clang17-debuginfo-17.0.6-bp155.2.2 clang17-devel-17.0.6-bp155.2.2 libLLVM17-17.0.6-bp155.2.2 libLLVM17-debuginfo-17.0.6-bp155.2.2 libLTO17-17.0.6-bp155.2.2 libLTO17-debuginfo-17.0.6-bp155.2.2 libclang-cpp17-17.0.6-bp155.2.2 libclang-cpp17-debuginfo-17.0.6-bp155.2.2 lld17-17.0.6-bp155.2.2 lld17-debuginfo-17.0.6-bp155.2.2 llvm17-17.0.6-bp155.2.2 llvm17-debuginfo-17.0.6-bp155.2.2 llvm17-devel-17.0.6-bp155.2.2 llvm17-devel-debuginfo-17.0.6-bp155.2.2 llvm17-gold-17.0.6-bp155.2.2 llvm17-gold-debuginfo-17.0.6-bp155.2.2 llvm17-libclang13-17.0.6-bp155.2.2 llvm17-libclang13-debuginfo-17.0.6-bp155.2.2 llvm17-polly-17.0.6-bp155.2.2 llvm17-polly-debuginfo-17.0.6-bp155.2.2 llvm17-polly-devel-17.0.6-bp155.2.2 - openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le x86_64): libomp17-devel-17.0.6-bp155.2.2 libomp17-devel-debuginfo-17.0.6-bp155.2.2 - openSUSE Backports SLE-15-SP5 (aarch64 x86_64): chromedriver-122.0.6261.128-bp155.2.75.1 chromedriver-debuginfo-122.0.6261.128-bp155.2.75.1 chromium-122.0.6261.128-bp155.2.75.1 chromium-debuginfo-122.0.6261.128-bp155.2.75.1 liblldb17-17.0.6-bp155.2.2 liblldb17-debuginfo-17.0.6-bp155.2.2 lldb17-17.0.6-bp155.2.2 lldb17-debuginfo-17.0.6-bp155.2.2 lldb17-devel-17.0.6-bp155.2.2 llvm17-libc++-devel-17.0.6-bp155.2.2 llvm17-libc++1-17.0.6-bp155.2.2 llvm17-libc++1-debuginfo-17.0.6-bp155.2.2 llvm17-libc++abi-devel-17.0.6-bp155.2.2 llvm17-libc++abi1-17.0.6-bp155.2.2 llvm17-libc++abi1-debuginfo-17.0.6-bp155.2.2 python3-lldb17-17.0.6-bp155.2.2 - openSUSE Backports SLE-15-SP5 (aarch64_ilp32): libLLVM17-64bit-17.0.6-bp155.2.2 libLLVM17-64bit-debuginfo-17.0.6-bp155.2.2 libclang-cpp17-64bit-17.0.6-bp155.2.2 libclang-cpp17-64bit-debuginfo-17.0.6-bp155.2.2 - openSUSE Backports SLE-15-SP5 (x86_64): libLLVM17-32bit-17.0.6-bp155.2.2 libLLVM17-32bit-debuginfo-17.0.6-bp155.2.2 libclang-cpp17-32bit-17.0.6-bp155.2.2 libclang-cpp17-32bit-debuginfo-17.0.6-bp155.2.2 - openSUSE Backports SLE-15-SP5 (noarch): clang17-doc-17.0.6-bp155.2.2 llvm17-doc-17.0.6-bp155.2.2 llvm17-opt-viewer-17.0.6-bp155.2.2 llvm17-vim-plugins-17.0.6-bp155.2.2 python3-clang17-17.0.6-bp155.2.2 References: https://www.suse.com/security/cve/CVE-2024-1669.html https://www.suse.com/security/cve/CVE-2024-1670.html https://www.suse.com/security/cve/CVE-2024-1671.html https://www.suse.com/security/cve/CVE-2024-1672.html https://www.suse.com/security/cve/CVE-2024-1673.html https://www.suse.com/security/cve/CVE-2024-1674.html https://www.suse.com/security/cve/CVE-2024-1675.html https://www.suse.com/security/cve/CVE-2024-1676.html https://www.suse.com/security/cve/CVE-2024-2173.html https://www.suse.com/security/cve/CVE-2024-2174.html https://www.suse.com/security/cve/CVE-2024-2176.html https://www.suse.com/security/cve/CVE-2024-2400.html https://bugzilla.suse.com/1220131 https://bugzilla.suse.com/1220604 https://bugzilla.suse.com/1221105 https://bugzilla.suse.com/1221335
participants (1)
-
opensuse-security@opensuse.org