drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in chromium
Name: |
Mehrere Probleme in chromium |
|
ID: |
openSUSE-SU-2013:1861-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
openSUSE 13.1 |
|
Datum: |
Do, 12. Dezember 2013, 19:55 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2906
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2907
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2908
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2909
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2910
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2911
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2912
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2913
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2914
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2915
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2916
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2917
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2918
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2919
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2920
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2921
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2922
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2923
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2924
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2925
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2928
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2931
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6621
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6622
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6623
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6624
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6627
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6628
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6631
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632 |
|
Applikationen: |
Chromium |
|
Originalnachricht |
openSUSE Security Update: chromium: update to 31.0.1650.57 ______________________________________________________________________________
Announcement ID: openSUSE-SU-2013:1861-1 Rating: important References: Cross-References: CVE-2013-2906 CVE-2013-2907 CVE-2013-2908 CVE-2013-2909 CVE-2013-2910 CVE-2013-2911 CVE-2013-2912 CVE-2013-2913 CVE-2013-2914 CVE-2013-2915 CVE-2013-2916 CVE-2013-2917 CVE-2013-2918 CVE-2013-2919 CVE-2013-2920 CVE-2013-2921 CVE-2013-2922 CVE-2013-2923 CVE-2013-2924 CVE-2013-2925 CVE-2013-2926 CVE-2013-2927 CVE-2013-2928 CVE-2013-2931 CVE-2013-6621 CVE-2013-6622 CVE-2013-6623 CVE-2013-6624 CVE-2013-6625 CVE-2013-6626 CVE-2013-6627 CVE-2013-6628 CVE-2013-6629 CVE-2013-6630 CVE-2013-6631 CVE-2013-6632 Affected Products: openSUSE 13.1 ______________________________________________________________________________
An update that fixes 36 vulnerabilities is now available.
Description:
Chromium was updated to 31.0.1650.57: Stable channel update: - Security Fixes: * CVE-2013-6632: Multiple memory corruption issues. - Update to Chromium 31.0.1650.48 Stable Channel update: - Security fixes: * CVE-2013-6621: Use after free related to speech input elements.. * CVE-2013-6622: Use after free related to media elements. * CVE-2013-6623: Out of bounds read in SVG. * CVE-2013-6624: Use after free related to “id” attribute strings. * CVE-2013-6625: Use after free in DOM ranges. * CVE-2013-6626: Address bar spoofing related to interstitial warnings. * CVE-2013-6627: Out of bounds read in HTTP parsing. * CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. * CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. * CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. * CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. * CVE-2013-6631: Use after free in libjingle. - Added patch chromium-fix-chromedriver-build.diff to fix the chromedriver build
- Enable ARM build for Chromium. * Added patches chromium-arm-webrtc-fix.patch, chromium-fix-arm-icu.patch and chromium-fix-arm-sysroot.patch to resolve ARM specific build issues
- Update to Chromium 30.0.1599.114 Stable Channel update: fix build for 32bit systems - Drop patch chromium-fix-chromedriver-build.diff. This is now fixed upstream - For openSUSE versions lower than 13.1, build against the in-tree libicu
- Update to Chromium 30.0.1599.101 - Security Fixes: + CVE-2013-2925: Use after free in XHR + CVE-2013-2926: Use after free in editing + CVE-2013-2927: Use after free in forms. + CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives.
- Update to Chromium 30.0.1599.66 - Easier searching by image - A number of new apps/extension APIs - Lots of under the hood changes for stability and performance - Security fixes: + CVE-2013-2906: Races in Web Audio + CVE-2013-2907: Out of bounds read in Window.prototype object + CVE-2013-2908: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2909: Use after free in inline-block rendering + CVE-2013-2910: Use-after-free in Web Audio + CVE-2013-2911: Use-after-free in XSLT + CVE-2013-2912: Use-after-free in PPAPI + CVE-2013-2913: Use-after-free in XML document parsing + CVE-2013-2914: Use after free in the Windows color chooser dialog + CVE-2013-2915: Address bar spoofing via a malformed scheme + CVE-2013-2916: Address bar spoofing related to the “204 No Content” status code + CVE-2013-2917: Out of bounds read in Web Audio + CVE-2013-2918: Use-after-free in DOM + CVE-2013-2919: Memory corruption in V8 + CVE-2013-2920: Out of bounds read in URL parsing + CVE-2013-2921: Use-after-free in resource loader + CVE-2013-2922: Use-after-free in template element + CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives + CVE-2013-2924: Use-after-free in ICU. Upstream bug
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 13.1:
zypper in -t patch openSUSE-2013-961
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.1 (i586 x86_64):
chromedriver-31.0.1650.57-8.2 chromedriver-debuginfo-31.0.1650.57-8.2 chromium-31.0.1650.57-8.2 chromium-debuginfo-31.0.1650.57-8.2 chromium-debugsource-31.0.1650.57-8.2 chromium-desktop-gnome-31.0.1650.57-8.2 chromium-desktop-kde-31.0.1650.57-8.2 chromium-ffmpegsumo-31.0.1650.57-8.2 chromium-ffmpegsumo-debuginfo-31.0.1650.57-8.2 chromium-suid-helper-31.0.1650.57-8.2 chromium-suid-helper-debuginfo-31.0.1650.57-8.2
References:
http://support.novell.com/security/cve/CVE-2013-2906.html http://support.novell.com/security/cve/CVE-2013-2907.html http://support.novell.com/security/cve/CVE-2013-2908.html http://support.novell.com/security/cve/CVE-2013-2909.html http://support.novell.com/security/cve/CVE-2013-2910.html http://support.novell.com/security/cve/CVE-2013-2911.html http://support.novell.com/security/cve/CVE-2013-2912.html http://support.novell.com/security/cve/CVE-2013-2913.html http://support.novell.com/security/cve/CVE-2013-2914.html http://support.novell.com/security/cve/CVE-2013-2915.html http://support.novell.com/security/cve/CVE-2013-2916.html http://support.novell.com/security/cve/CVE-2013-2917.html http://support.novell.com/security/cve/CVE-2013-2918.html http://support.novell.com/security/cve/CVE-2013-2919.html http://support.novell.com/security/cve/CVE-2013-2920.html http://support.novell.com/security/cve/CVE-2013-2921.html http://support.novell.com/security/cve/CVE-2013-2922.html http://support.novell.com/security/cve/CVE-2013-2923.html http://support.novell.com/security/cve/CVE-2013-2924.html http://support.novell.com/security/cve/CVE-2013-2925.html http://support.novell.com/security/cve/CVE-2013-2926.html http://support.novell.com/security/cve/CVE-2013-2927.html http://support.novell.com/security/cve/CVE-2013-2928.html http://support.novell.com/security/cve/CVE-2013-2931.html http://support.novell.com/security/cve/CVE-2013-6621.html http://support.novell.com/security/cve/CVE-2013-6622.html http://support.novell.com/security/cve/CVE-2013-6623.html http://support.novell.com/security/cve/CVE-2013-6624.html http://support.novell.com/security/cve/CVE-2013-6625.html http://support.novell.com/security/cve/CVE-2013-6626.html http://support.novell.com/security/cve/CVE-2013-6627.html http://support.novell.com/security/cve/CVE-2013-6628.html http://support.novell.com/security/cve/CVE-2013-6629.html http://support.novell.com/security/cve/CVE-2013-6630.html http://support.novell.com/security/cve/CVE-2013-6631.html http://support.novell.com/security/cve/CVE-2013-6632.html
-- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
|
|
|
|