Mailinglist Archive: opensuse-updates (61 mails)

< Previous Next >
openSUSE-SU-2015:0748-1: moderate: Security update for Chromium
openSUSE Security Update: Security update for Chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:0748-1
Rating: moderate
References: #927302
Cross-References: CVE-2015-1235 CVE-2015-1236 CVE-2015-1237
CVE-2015-1238 CVE-2015-1240 CVE-2015-1241
CVE-2015-1242 CVE-2015-1244 CVE-2015-1245
CVE-2015-1246 CVE-2015-1247 CVE-2015-1248
CVE-2015-1249 CVE-2015-3333 CVE-2015-3334
CVE-2015-3335 CVE-2015-3336
Affected Products:
openSUSE 13.2
openSUSE 13.1
______________________________________________________________________________

An update that fixes 17 vulnerabilities is now available.

Description:

Chromium was updated to latest stable release 42.0.2311.90 to fix security
issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-1235: Cross-origin-bypass in HTML parser.
* CVE-2015-1236: Cross-origin-bypass in Blink.
* CVE-2015-1237: Use-after-free in IPC.
* CVE-2015-1238: Out-of-bounds write in Skia.
* CVE-2015-1240: Out-of-bounds read in WebGL.
* CVE-2015-1241: Tap-Jacking.
* CVE-2015-1242: Type confusion in V8.
* CVE-2015-1244: HSTS bypass in WebSockets.
* CVE-2015-1245: Use-after-free in PDFium.
* CVE-2015-1246: Out-of-bounds read in Blink.
* CVE-2015-1247: Scheme issues in OpenSearch.
* CVE-2015-1248: SafeBrowsing bypass.
* CVE-2015-1249: Various fixes from internal audits, fuzzing and other
initiatives.
* CVE-2015-3333: Multiple vulnerabilities in V8 fixed at the tip of the
4.2 branch (currently 4.2.77.14).
* CVE-2015-3336: fullscreen and UI locking without user confirmeation
* CVE-2015-3335: unspecified impact of crafed programs running in NaCl
sandbox
* CVE-2015-3334: "Media: Allowed by you" sometimes not shown in a
permissions table

New functionality added:
* A number of new apps, extension and Web Platform APIs (including the
Push API!)
* Lots of under the hood changes for stability and performance


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2015-320=1

- openSUSE 13.1:

zypper in -t patch openSUSE-2015-320=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

chromedriver-42.0.2311.90-23.3
chromedriver-debuginfo-42.0.2311.90-23.3
chromium-42.0.2311.90-23.3
chromium-debuginfo-42.0.2311.90-23.3
chromium-debugsource-42.0.2311.90-23.3
chromium-desktop-gnome-42.0.2311.90-23.3
chromium-desktop-kde-42.0.2311.90-23.3
chromium-ffmpegsumo-42.0.2311.90-23.3
chromium-ffmpegsumo-debuginfo-42.0.2311.90-23.3

- openSUSE 13.1 (i586 x86_64):

chromedriver-42.0.2311.90-78.2
chromedriver-debuginfo-42.0.2311.90-78.2
chromium-42.0.2311.90-78.2
chromium-debuginfo-42.0.2311.90-78.2
chromium-debugsource-42.0.2311.90-78.2
chromium-desktop-gnome-42.0.2311.90-78.2
chromium-desktop-kde-42.0.2311.90-78.2
chromium-ffmpegsumo-42.0.2311.90-78.2
chromium-ffmpegsumo-debuginfo-42.0.2311.90-78.2


References:

https://www.suse.com/security/cve/CVE-2015-1235.html
https://www.suse.com/security/cve/CVE-2015-1236.html
https://www.suse.com/security/cve/CVE-2015-1237.html
https://www.suse.com/security/cve/CVE-2015-1238.html
https://www.suse.com/security/cve/CVE-2015-1240.html
https://www.suse.com/security/cve/CVE-2015-1241.html
https://www.suse.com/security/cve/CVE-2015-1242.html
https://www.suse.com/security/cve/CVE-2015-1244.html
https://www.suse.com/security/cve/CVE-2015-1245.html
https://www.suse.com/security/cve/CVE-2015-1246.html
https://www.suse.com/security/cve/CVE-2015-1247.html
https://www.suse.com/security/cve/CVE-2015-1248.html
https://www.suse.com/security/cve/CVE-2015-1249.html
https://www.suse.com/security/cve/CVE-2015-3333.html
https://www.suse.com/security/cve/CVE-2015-3334.html
https://www.suse.com/security/cve/CVE-2015-3335.html
https://www.suse.com/security/cve/CVE-2015-3336.html
https://bugzilla.suse.com/927302


< Previous Next >
This Thread
  • No further messages