[prev in list] [next in list] [prev in thread] [next in thread] 

List:       suse-security-announce
Subject:    [security-announce] openSUSE-SU-2015:1287-1: important: Security update for Chromium
From:       opensuse-security () opensuse ! org
Date:       2015-07-26 19:08:24
Message-ID: 20150726190824.E402C320A5 () maintenance ! suse ! de
[Download RAW message or body]

   openSUSE Security Update: Security update for Chromium
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2015:1287-1
Rating:             important
References:         #939077 
Cross-References:   CVE-2015-1270 CVE-2015-1271 CVE-2015-1272
                    CVE-2015-1273 CVE-2015-1274 CVE-2015-1275
                    CVE-2015-1276 CVE-2015-1277 CVE-2015-1278
                    CVE-2015-1279 CVE-2015-1280 CVE-2015-1281
                    CVE-2015-1282 CVE-2015-1283 CVE-2015-1284
                    CVE-2015-1285 CVE-2015-1286 CVE-2015-1287
                    CVE-2015-1288 CVE-2015-1289 CVE-2015-5605
                   
Affected Products:
                    openSUSE 13.2
                    openSUSE 13.1
______________________________________________________________________________

   An update that fixes 21 vulnerabilities is now available.

Description:

   Chromium was updated to 44.0.2403.89 to fix multiple security issues.

   The following vulnerabilities were fixed:

   * CVE-2015-1271: Heap-buffer-overflow in pdfium
   * CVE-2015-1273: Heap-buffer-overflow in pdfium
   * CVE-2015-1274: Settings allowed executable files to run immediately
     after download
   * CVE-2015-1275: UXSS in Chrome for Android
   * CVE-2015-1276: Use-after-free in IndexedDB
   * CVE-2015-1279: Heap-buffer-overflow in pdfium
   * CVE-2015-1280: Memory corruption in skia
   * CVE-2015-1281: CSP bypass
   * CVE-2015-1282: Use-after-free in pdfium
   * CVE-2015-1283: Heap-buffer-overflow in expat
   * CVE-2015-1284: Use-after-free in blink
   * CVE-2015-1286: UXSS in blink
   * CVE-2015-1287: SOP bypass with CSS
   * CVE-2015-1270: Uninitialized memory read in ICU
   * CVE-2015-1272: Use-after-free related to unexpected GPU process
     termination
   * CVE-2015-1277: Use-after-free in accessibility
   * CVE-2015-1278: URL spoofing using pdf files
   * CVE-2015-1285: Information leak in XSS auditor
   * CVE-2015-1288: Spell checking dictionaries fetched over HTTP
   * CVE-2015-1289: Various fixes from internal audits, fuzzing and other
     initiatives
   * CVE-2015-5605: Rgular-expression implementation mishandles interrupts,
     DoS via JS

   The following non-security changes are included:

   * A number of new apps/extension APIs
   * Lots of under the hood changes for stability and performance
   * Pepper Flash plugin updated to 18.0.0.209


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.2:

      zypper in -t patch openSUSE-2015-513=1

   - openSUSE 13.1:

      zypper in -t patch openSUSE-2015-513=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.2 (i586 x86_64):

      chromedriver-44.0.2403.89-38.1
      chromedriver-debuginfo-44.0.2403.89-38.1
      chromium-44.0.2403.89-38.1
      chromium-debuginfo-44.0.2403.89-38.1
      chromium-debugsource-44.0.2403.89-38.1
      chromium-desktop-gnome-44.0.2403.89-38.1
      chromium-desktop-kde-44.0.2403.89-38.1
      chromium-ffmpegsumo-44.0.2403.89-38.1
      chromium-ffmpegsumo-debuginfo-44.0.2403.89-38.1

   - openSUSE 13.1 (i586 x86_64):

      chromedriver-44.0.2403.89-93.1
      chromedriver-debuginfo-44.0.2403.89-93.1
      chromium-44.0.2403.89-93.1
      chromium-debuginfo-44.0.2403.89-93.1
      chromium-debugsource-44.0.2403.89-93.1
      chromium-desktop-gnome-44.0.2403.89-93.1
      chromium-desktop-kde-44.0.2403.89-93.1
      chromium-ffmpegsumo-44.0.2403.89-93.1
      chromium-ffmpegsumo-debuginfo-44.0.2403.89-93.1


References:

   https://www.suse.com/security/cve/CVE-2015-1270.html
   https://www.suse.com/security/cve/CVE-2015-1271.html
   https://www.suse.com/security/cve/CVE-2015-1272.html
   https://www.suse.com/security/cve/CVE-2015-1273.html
   https://www.suse.com/security/cve/CVE-2015-1274.html
   https://www.suse.com/security/cve/CVE-2015-1275.html
   https://www.suse.com/security/cve/CVE-2015-1276.html
   https://www.suse.com/security/cve/CVE-2015-1277.html
   https://www.suse.com/security/cve/CVE-2015-1278.html
   https://www.suse.com/security/cve/CVE-2015-1279.html
   https://www.suse.com/security/cve/CVE-2015-1280.html
   https://www.suse.com/security/cve/CVE-2015-1281.html
   https://www.suse.com/security/cve/CVE-2015-1282.html
   https://www.suse.com/security/cve/CVE-2015-1283.html
   https://www.suse.com/security/cve/CVE-2015-1284.html
   https://www.suse.com/security/cve/CVE-2015-1285.html
   https://www.suse.com/security/cve/CVE-2015-1286.html
   https://www.suse.com/security/cve/CVE-2015-1287.html
   https://www.suse.com/security/cve/CVE-2015-1288.html
   https://www.suse.com/security/cve/CVE-2015-1289.html
   https://www.suse.com/security/cve/CVE-2015-5605.html
   https://bugzilla.suse.com/939077

-- 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic