[security-announce] openSUSE-SU-2018:4142-1: important: Security update for Chromium
openSUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2018:4142-1 Rating: important References: #1118529 #1119364 Cross-References: CVE-2018-17480 CVE-2018-17481 CVE-2018-18335 CVE-2018-18336 CVE-2018-18337 CVE-2018-18338 CVE-2018-18339 CVE-2018-18340 CVE-2018-18341 CVE-2018-18342 CVE-2018-18343 CVE-2018-18344 CVE-2018-18345 CVE-2018-18346 CVE-2018-18347 CVE-2018-18348 CVE-2018-18349 CVE-2018-18350 CVE-2018-18351 CVE-2018-18352 CVE-2018-18353 CVE-2018-18354 CVE-2018-18355 CVE-2018-18356 CVE-2018-18357 CVE-2018-18358 CVE-2018-18359 Affected Products: openSUSE Leap 42.3 ______________________________________________________________________________ An update that fixes 27 vulnerabilities is now available. Description: This update to Chromium 71.0.3578.98 fixes the following issues: Security issues fixed (boo#1118529): - CVE-2018-17480: Out of bounds write in V8 - CVE-2018-17481: Use after frees in PDFium - CVE-2018-18335: Heap buffer overflow in Skia - CVE-2018-18336: Use after free in PDFium - CVE-2018-18337: Use after free in Blink - CVE-2018-18338: Heap buffer overflow in Canvas - CVE-2018-18339: Use after free in WebAudio - CVE-2018-18340: Use after free in MediaRecorder - CVE-2018-18341: Heap buffer overflow in Blink - CVE-2018-18342: Out of bounds write in V8 - CVE-2018-18343: Use after free in Skia - CVE-2018-18344: Inappropriate implementation in Extensions - Multiple issues in SQLite via WebSQL - CVE-2018-18345: Inappropriate implementation in Site Isolation - CVE-2018-18346: Incorrect security UI in Blink - CVE-2018-18347: Inappropriate implementation in Navigation - CVE-2018-18348: Inappropriate implementation in Omnibox - CVE-2018-18349: Insufficient policy enforcement in Blink - CVE-2018-18350: Insufficient policy enforcement in Blink - CVE-2018-18351: Insufficient policy enforcement in Navigation - CVE-2018-18352: Inappropriate implementation in Media - CVE-2018-18353: Inappropriate implementation in Network Authentication - CVE-2018-18354: Insufficient data validation in Shell Integration - CVE-2018-18355: Insufficient policy enforcement in URL Formatter - CVE-2018-18356: Use after free in Skia - CVE-2018-18357: Insufficient policy enforcement in URL Formatter - CVE-2018-18358: Insufficient policy enforcement in Proxy - CVE-2018-18359: Out of bounds read in V8 - Inappropriate implementation in PDFium - Use after free in Extensions - Inappropriate implementation in Navigation - Insufficient policy enforcement in Navigation - Insufficient policy enforcement in URL Formatter - Various fixes from internal audits, fuzzing and other initiatives - CVE-2018-17481: Use after free in PDFium (boo#1119364) The following changes are included: - advertisements posing as error messages are now blocked - Automatic playing of content at page load mostly disabled - New JavaScript API for relative time display Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-1557=1 Package List: - openSUSE Leap 42.3 (x86_64): chromedriver-71.0.3578.98-189.1 chromedriver-debuginfo-71.0.3578.98-189.1 chromium-71.0.3578.98-189.1 chromium-debuginfo-71.0.3578.98-189.1 chromium-debugsource-71.0.3578.98-189.1 References: https://www.suse.com/security/cve/CVE-2018-17480.html https://www.suse.com/security/cve/CVE-2018-17481.html https://www.suse.com/security/cve/CVE-2018-18335.html https://www.suse.com/security/cve/CVE-2018-18336.html https://www.suse.com/security/cve/CVE-2018-18337.html https://www.suse.com/security/cve/CVE-2018-18338.html https://www.suse.com/security/cve/CVE-2018-18339.html https://www.suse.com/security/cve/CVE-2018-18340.html https://www.suse.com/security/cve/CVE-2018-18341.html https://www.suse.com/security/cve/CVE-2018-18342.html https://www.suse.com/security/cve/CVE-2018-18343.html https://www.suse.com/security/cve/CVE-2018-18344.html https://www.suse.com/security/cve/CVE-2018-18345.html https://www.suse.com/security/cve/CVE-2018-18346.html https://www.suse.com/security/cve/CVE-2018-18347.html https://www.suse.com/security/cve/CVE-2018-18348.html https://www.suse.com/security/cve/CVE-2018-18349.html https://www.suse.com/security/cve/CVE-2018-18350.html https://www.suse.com/security/cve/CVE-2018-18351.html https://www.suse.com/security/cve/CVE-2018-18352.html https://www.suse.com/security/cve/CVE-2018-18353.html https://www.suse.com/security/cve/CVE-2018-18354.html https://www.suse.com/security/cve/CVE-2018-18355.html https://www.suse.com/security/cve/CVE-2018-18356.html https://www.suse.com/security/cve/CVE-2018-18357.html https://www.suse.com/security/cve/CVE-2018-18358.html https://www.suse.com/security/cve/CVE-2018-18359.html https://bugzilla.suse.com/1118529 https://bugzilla.suse.com/1119364 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org