Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Chromium
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Chromium
ID: openSUSE-SU-2018:4056-1
Distribution: SUSE
Plattformen: openSUSE Leap 15.0, openSUSE Backports SLE-15
Datum: Sa, 8. Dezember 2018, 19:12
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18341
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18347
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18344
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18336
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18349
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18342
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18359
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18337
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17481
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18355
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18357
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18350
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18353
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18354
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18348
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18340
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18346
Applikationen: Chromium

Originalnachricht

   openSUSE Security Update: Security update for Chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4056-1
Rating: important
References: #1118529
Cross-References: CVE-2018-17480 CVE-2018-17481 CVE-2018-18335
CVE-2018-18336 CVE-2018-18337 CVE-2018-18338
CVE-2018-18339 CVE-2018-18340 CVE-2018-18341
CVE-2018-18342 CVE-2018-18343 CVE-2018-18344
CVE-2018-18345 CVE-2018-18346 CVE-2018-18347
CVE-2018-18348 CVE-2018-18349 CVE-2018-18350
CVE-2018-18351 CVE-2018-18352 CVE-2018-18353
CVE-2018-18354 CVE-2018-18355 CVE-2018-18356
CVE-2018-18357 CVE-2018-18358 CVE-2018-18359

Affected Products:
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes 27 vulnerabilities is now available.

Description:

This update to Chromium version 71.0.3578.80 fixes security issues and
bugs.

Security issues fixed (boo#1118529):

- CVE-2018-17480: Out of bounds write in V8
- CVE-2018-17481: Use after frees in PDFium
- CVE-2018-18335: Heap buffer overflow in Skia
- CVE-2018-18336: Use after free in PDFium
- CVE-2018-18337: Use after free in Blink
- CVE-2018-18338: Heap buffer overflow in Canvas
- CVE-2018-18339: Use after free in WebAudio
- CVE-2018-18340: Use after free in MediaRecorder
- CVE-2018-18341: Heap buffer overflow in Blink
- CVE-2018-18342: Out of bounds write in V8
- CVE-2018-18343: Use after free in Skia
- CVE-2018-18344: Inappropriate implementation in Extensions
- Multiple issues in SQLite via WebSQL
- CVE-2018-18345: Inappropriate implementation in Site Isolation
- CVE-2018-18346: Incorrect security UI in Blink
- CVE-2018-18347: Inappropriate implementation in Navigation
- CVE-2018-18348: Inappropriate implementation in Omnibox
- CVE-2018-18349: Insufficient policy enforcement in Blink
- CVE-2018-18350: Insufficient policy enforcement in Blink
- CVE-2018-18351: Insufficient policy enforcement in Navigation
- CVE-2018-18352: Inappropriate implementation in Media
- CVE-2018-18353: Inappropriate implementation in Network Authentication
- CVE-2018-18354: Insufficient data validation in Shell Integration
- CVE-2018-18355: Insufficient policy enforcement in URL Formatter
- CVE-2018-18356: Use after free in Skia
- CVE-2018-18357: Insufficient policy enforcement in URL Formatter
- CVE-2018-18358: Insufficient policy enforcement in Proxy
- CVE-2018-18359: Out of bounds read in V8
- Inappropriate implementation in PDFium
- Use after free in Extensions
- Inappropriate implementation in Navigation
- Insufficient policy enforcement in Navigation
- Insufficient policy enforcement in URL Formatter
- Various fixes from internal audits, fuzzing and other initiatives

The following changes are included:

- advertisements posing as error messages are now blocked
- Automatic playing of content at page load mostly disabled
- New JavaScript API for relative time display


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1521=1

- openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1521=1



Package List:

- openSUSE Leap 15.0 (x86_64):

chromedriver-71.0.3578.80-lp150.2.30.1
chromedriver-debuginfo-71.0.3578.80-lp150.2.30.1
chromium-71.0.3578.80-lp150.2.30.1
chromium-debuginfo-71.0.3578.80-lp150.2.30.1
chromium-debugsource-71.0.3578.80-lp150.2.30.1

- openSUSE Backports SLE-15 (aarch64 x86_64):

chromedriver-71.0.3578.80-bp150.2.23.1
chromedriver-debuginfo-71.0.3578.80-bp150.2.23.1
chromium-71.0.3578.80-bp150.2.23.1
chromium-debuginfo-71.0.3578.80-bp150.2.23.1
chromium-debugsource-71.0.3578.80-bp150.2.23.1


References:

https://www.suse.com/security/cve/CVE-2018-17480.html
https://www.suse.com/security/cve/CVE-2018-17481.html
https://www.suse.com/security/cve/CVE-2018-18335.html
https://www.suse.com/security/cve/CVE-2018-18336.html
https://www.suse.com/security/cve/CVE-2018-18337.html
https://www.suse.com/security/cve/CVE-2018-18338.html
https://www.suse.com/security/cve/CVE-2018-18339.html
https://www.suse.com/security/cve/CVE-2018-18340.html
https://www.suse.com/security/cve/CVE-2018-18341.html
https://www.suse.com/security/cve/CVE-2018-18342.html
https://www.suse.com/security/cve/CVE-2018-18343.html
https://www.suse.com/security/cve/CVE-2018-18344.html
https://www.suse.com/security/cve/CVE-2018-18345.html
https://www.suse.com/security/cve/CVE-2018-18346.html
https://www.suse.com/security/cve/CVE-2018-18347.html
https://www.suse.com/security/cve/CVE-2018-18348.html
https://www.suse.com/security/cve/CVE-2018-18349.html
https://www.suse.com/security/cve/CVE-2018-18350.html
https://www.suse.com/security/cve/CVE-2018-18351.html
https://www.suse.com/security/cve/CVE-2018-18352.html
https://www.suse.com/security/cve/CVE-2018-18353.html
https://www.suse.com/security/cve/CVE-2018-18354.html
https://www.suse.com/security/cve/CVE-2018-18355.html
https://www.suse.com/security/cve/CVE-2018-18356.html
https://www.suse.com/security/cve/CVE-2018-18357.html
https://www.suse.com/security/cve/CVE-2018-18358.html
https://www.suse.com/security/cve/CVE-2018-18359.html
https://bugzilla.suse.com/1118529

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung