Mailinglist Archive: opensuse-updates (61 mails)
< Previous | Next > |
openSUSE-SU-2015:0748-1: moderate: Security update for Chromium
- From: opensuse-security@xxxxxxxxxxxx
- Date: Wed, 22 Apr 2015 11:04:47 +0200 (CEST)
- Message-id: <20150422090447.8D9703213E@maintenance.suse.de>
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0748-1
Rating: moderate
References: #927302
Cross-References: CVE-2015-1235 CVE-2015-1236 CVE-2015-1237
CVE-2015-1238 CVE-2015-1240 CVE-2015-1241
CVE-2015-1242 CVE-2015-1244 CVE-2015-1245
CVE-2015-1246 CVE-2015-1247 CVE-2015-1248
CVE-2015-1249 CVE-2015-3333 CVE-2015-3334
CVE-2015-3335 CVE-2015-3336
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________
An update that fixes 17 vulnerabilities is now available.
Description:
Chromium was updated to latest stable release 42.0.2311.90 to fix security
issues and bugs.
The following vulnerabilities were fixed:
* CVE-2015-1235: Cross-origin-bypass in HTML parser.
* CVE-2015-1236: Cross-origin-bypass in Blink.
* CVE-2015-1237: Use-after-free in IPC.
* CVE-2015-1238: Out-of-bounds write in Skia.
* CVE-2015-1240: Out-of-bounds read in WebGL.
* CVE-2015-1241: Tap-Jacking.
* CVE-2015-1242: Type confusion in V8.
* CVE-2015-1244: HSTS bypass in WebSockets.
* CVE-2015-1245: Use-after-free in PDFium.
* CVE-2015-1246: Out-of-bounds read in Blink.
* CVE-2015-1247: Scheme issues in OpenSearch.
* CVE-2015-1248: SafeBrowsing bypass.
* CVE-2015-1249: Various fixes from internal audits, fuzzing and other
initiatives.
* CVE-2015-3333: Multiple vulnerabilities in V8 fixed at the tip of the
4.2 branch (currently 4.2.77.14).
* CVE-2015-3336: fullscreen and UI locking without user confirmeation
* CVE-2015-3335: unspecified impact of crafed programs running in NaCl
sandbox
* CVE-2015-3334: "Media: Allowed by you" sometimes not shown in a
permissions table
New functionality added:
* A number of new apps, extension and Web Platform APIs (including the
Push API!)
* Lots of under the hood changes for stability and performance
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-320=1
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-320=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
chromedriver-42.0.2311.90-23.3
chromedriver-debuginfo-42.0.2311.90-23.3
chromium-42.0.2311.90-23.3
chromium-debuginfo-42.0.2311.90-23.3
chromium-debugsource-42.0.2311.90-23.3
chromium-desktop-gnome-42.0.2311.90-23.3
chromium-desktop-kde-42.0.2311.90-23.3
chromium-ffmpegsumo-42.0.2311.90-23.3
chromium-ffmpegsumo-debuginfo-42.0.2311.90-23.3
- openSUSE 13.1 (i586 x86_64):
chromedriver-42.0.2311.90-78.2
chromedriver-debuginfo-42.0.2311.90-78.2
chromium-42.0.2311.90-78.2
chromium-debuginfo-42.0.2311.90-78.2
chromium-debugsource-42.0.2311.90-78.2
chromium-desktop-gnome-42.0.2311.90-78.2
chromium-desktop-kde-42.0.2311.90-78.2
chromium-ffmpegsumo-42.0.2311.90-78.2
chromium-ffmpegsumo-debuginfo-42.0.2311.90-78.2
References:
https://www.suse.com/security/cve/CVE-2015-1235.html
https://www.suse.com/security/cve/CVE-2015-1236.html
https://www.suse.com/security/cve/CVE-2015-1237.html
https://www.suse.com/security/cve/CVE-2015-1238.html
https://www.suse.com/security/cve/CVE-2015-1240.html
https://www.suse.com/security/cve/CVE-2015-1241.html
https://www.suse.com/security/cve/CVE-2015-1242.html
https://www.suse.com/security/cve/CVE-2015-1244.html
https://www.suse.com/security/cve/CVE-2015-1245.html
https://www.suse.com/security/cve/CVE-2015-1246.html
https://www.suse.com/security/cve/CVE-2015-1247.html
https://www.suse.com/security/cve/CVE-2015-1248.html
https://www.suse.com/security/cve/CVE-2015-1249.html
https://www.suse.com/security/cve/CVE-2015-3333.html
https://www.suse.com/security/cve/CVE-2015-3334.html
https://www.suse.com/security/cve/CVE-2015-3335.html
https://www.suse.com/security/cve/CVE-2015-3336.html
https://bugzilla.suse.com/927302
______________________________________________________________________________
Announcement ID: openSUSE-SU-2015:0748-1
Rating: moderate
References: #927302
Cross-References: CVE-2015-1235 CVE-2015-1236 CVE-2015-1237
CVE-2015-1238 CVE-2015-1240 CVE-2015-1241
CVE-2015-1242 CVE-2015-1244 CVE-2015-1245
CVE-2015-1246 CVE-2015-1247 CVE-2015-1248
CVE-2015-1249 CVE-2015-3333 CVE-2015-3334
CVE-2015-3335 CVE-2015-3336
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________
An update that fixes 17 vulnerabilities is now available.
Description:
Chromium was updated to latest stable release 42.0.2311.90 to fix security
issues and bugs.
The following vulnerabilities were fixed:
* CVE-2015-1235: Cross-origin-bypass in HTML parser.
* CVE-2015-1236: Cross-origin-bypass in Blink.
* CVE-2015-1237: Use-after-free in IPC.
* CVE-2015-1238: Out-of-bounds write in Skia.
* CVE-2015-1240: Out-of-bounds read in WebGL.
* CVE-2015-1241: Tap-Jacking.
* CVE-2015-1242: Type confusion in V8.
* CVE-2015-1244: HSTS bypass in WebSockets.
* CVE-2015-1245: Use-after-free in PDFium.
* CVE-2015-1246: Out-of-bounds read in Blink.
* CVE-2015-1247: Scheme issues in OpenSearch.
* CVE-2015-1248: SafeBrowsing bypass.
* CVE-2015-1249: Various fixes from internal audits, fuzzing and other
initiatives.
* CVE-2015-3333: Multiple vulnerabilities in V8 fixed at the tip of the
4.2 branch (currently 4.2.77.14).
* CVE-2015-3336: fullscreen and UI locking without user confirmeation
* CVE-2015-3335: unspecified impact of crafed programs running in NaCl
sandbox
* CVE-2015-3334: "Media: Allowed by you" sometimes not shown in a
permissions table
New functionality added:
* A number of new apps, extension and Web Platform APIs (including the
Push API!)
* Lots of under the hood changes for stability and performance
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2015-320=1
- openSUSE 13.1:
zypper in -t patch openSUSE-2015-320=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
chromedriver-42.0.2311.90-23.3
chromedriver-debuginfo-42.0.2311.90-23.3
chromium-42.0.2311.90-23.3
chromium-debuginfo-42.0.2311.90-23.3
chromium-debugsource-42.0.2311.90-23.3
chromium-desktop-gnome-42.0.2311.90-23.3
chromium-desktop-kde-42.0.2311.90-23.3
chromium-ffmpegsumo-42.0.2311.90-23.3
chromium-ffmpegsumo-debuginfo-42.0.2311.90-23.3
- openSUSE 13.1 (i586 x86_64):
chromedriver-42.0.2311.90-78.2
chromedriver-debuginfo-42.0.2311.90-78.2
chromium-42.0.2311.90-78.2
chromium-debuginfo-42.0.2311.90-78.2
chromium-debugsource-42.0.2311.90-78.2
chromium-desktop-gnome-42.0.2311.90-78.2
chromium-desktop-kde-42.0.2311.90-78.2
chromium-ffmpegsumo-42.0.2311.90-78.2
chromium-ffmpegsumo-debuginfo-42.0.2311.90-78.2
References:
https://www.suse.com/security/cve/CVE-2015-1235.html
https://www.suse.com/security/cve/CVE-2015-1236.html
https://www.suse.com/security/cve/CVE-2015-1237.html
https://www.suse.com/security/cve/CVE-2015-1238.html
https://www.suse.com/security/cve/CVE-2015-1240.html
https://www.suse.com/security/cve/CVE-2015-1241.html
https://www.suse.com/security/cve/CVE-2015-1242.html
https://www.suse.com/security/cve/CVE-2015-1244.html
https://www.suse.com/security/cve/CVE-2015-1245.html
https://www.suse.com/security/cve/CVE-2015-1246.html
https://www.suse.com/security/cve/CVE-2015-1247.html
https://www.suse.com/security/cve/CVE-2015-1248.html
https://www.suse.com/security/cve/CVE-2015-1249.html
https://www.suse.com/security/cve/CVE-2015-3333.html
https://www.suse.com/security/cve/CVE-2015-3334.html
https://www.suse.com/security/cve/CVE-2015-3335.html
https://www.suse.com/security/cve/CVE-2015-3336.html
https://bugzilla.suse.com/927302
< Previous | Next > |