[prev in list] [next in list] [prev in thread] [next in thread]
List: suse-security-announce
Subject: [security-announce] openSUSE-SU-2018:3835-1: important: Security update for chromium
From: opensuse-security () opensuse ! org
Date: 2018-11-20 23:11:39
Message-ID: 20181120231139.47A0EFCA4 () maintenance ! suse ! de
[Download RAW message or body]
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2018:3835-1
Rating: important
References: #1112111 #1115537
Cross-References: CVE-2018-17462 CVE-2018-17463 CVE-2018-17464
CVE-2018-17465 CVE-2018-17466 CVE-2018-17467
CVE-2018-17468 CVE-2018-17469 CVE-2018-17470
CVE-2018-17471 CVE-2018-17472 CVE-2018-17473
CVE-2018-17474 CVE-2018-17475 CVE-2018-17476
CVE-2018-17477 CVE-2018-17478 CVE-2018-5179
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 18 vulnerabilities is now available.
Description:
This update contains Chromium 70.0.3538.102 and fixes security issues and
bugs.
Vulnerabilities fixed in 70.0.3538.102:
- CVE-2018-17478: Out of bounds memory access in V8 (boo#1115537)
Vulnerabilities fixed in 70.0.3538.67 (bsc#1112111):
- CVE-2018-17462: Sandbox escape in AppCache
- CVE-2018-17463: Remote code execution in V8
- Heap buffer overflow in Little CMS in PDFium
- CVE-2018-17464: URL spoof in Omnibox
- CVE-2018-17465: Use after free in V8
- CVE-2018-17466: Memory corruption in Angle
- CVE-2018-17467: URL spoof in Omnibox
- CVE-2018-17468: Cross-origin URL disclosure in Blink
- CVE-2018-17469: Heap buffer overflow in PDFium
- CVE-2018-17470: Memory corruption in GPU Internals
- CVE-2018-17471: Security UI occlusion in full screen mode
- CVE-2018-17473: URL spoof in Omnibox
- CVE-2018-17474: Use after free in Blink
- CVE-2018-17475: URL spoof in Omnibox
- CVE-2018-17476: Security UI occlusion in full screen mode
- CVE-2018-5179: Lack of limits on update() in ServiceWorker
- CVE-2018-17477: UI spoof in Extensions
This update contains the following packaging changes:
- VAAPI hardware accelerated rendering is now enabled by default.
- Use the system libusb-1.0 library
- Use bundled harfbuzz library
- Disable gnome-keyring to avoid crashes
- noto-emoji-fonts is no longer a recommended dependency
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2018-1436=1
Package List:
- SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):
chromedriver-70.0.3538.102-74.1
chromium-70.0.3538.102-74.1
References:
https://www.suse.com/security/cve/CVE-2018-17462.html
https://www.suse.com/security/cve/CVE-2018-17463.html
https://www.suse.com/security/cve/CVE-2018-17464.html
https://www.suse.com/security/cve/CVE-2018-17465.html
https://www.suse.com/security/cve/CVE-2018-17466.html
https://www.suse.com/security/cve/CVE-2018-17467.html
https://www.suse.com/security/cve/CVE-2018-17468.html
https://www.suse.com/security/cve/CVE-2018-17469.html
https://www.suse.com/security/cve/CVE-2018-17470.html
https://www.suse.com/security/cve/CVE-2018-17471.html
https://www.suse.com/security/cve/CVE-2018-17472.html
https://www.suse.com/security/cve/CVE-2018-17473.html
https://www.suse.com/security/cve/CVE-2018-17474.html
https://www.suse.com/security/cve/CVE-2018-17475.html
https://www.suse.com/security/cve/CVE-2018-17476.html
https://www.suse.com/security/cve/CVE-2018-17477.html
https://www.suse.com/security/cve/CVE-2018-17478.html
https://www.suse.com/security/cve/CVE-2018-5179.html
https://bugzilla.suse.com/1112111
https://bugzilla.suse.com/1115537
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic