Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] openSUSE-SU-2015:1287-1: important: Security update for Chromium

Recommended Posts

openSUSE Security Update: Security update for Chromium

______________________________________________________________________________

 

Announcement ID: openSUSE-SU-2015:1287-1

Rating: important

References: #939077

Cross-References: CVE-2015-1270 CVE-2015-1271 CVE-2015-1272

CVE-2015-1273 CVE-2015-1274 CVE-2015-1275

CVE-2015-1276 CVE-2015-1277 CVE-2015-1278

CVE-2015-1279 CVE-2015-1280 CVE-2015-1281

CVE-2015-1282 CVE-2015-1283 CVE-2015-1284

CVE-2015-1285 CVE-2015-1286 CVE-2015-1287

CVE-2015-1288 CVE-2015-1289 CVE-2015-5605

 

Affected Products:

openSUSE 13.2

openSUSE 13.1

______________________________________________________________________________

 

An update that fixes 21 vulnerabilities is now available.

 

Description:

 

Chromium was updated to 44.0.2403.89 to fix multiple security issues.

 

The following vulnerabilities were fixed:

 

* CVE-2015-1271: Heap-buffer-overflow in pdfium

* CVE-2015-1273: Heap-buffer-overflow in pdfium

* CVE-2015-1274: Settings allowed executable files to run immediately

after download

* CVE-2015-1275: UXSS in Chrome for Android

* CVE-2015-1276: Use-after-free in IndexedDB

* CVE-2015-1279: Heap-buffer-overflow in pdfium

* CVE-2015-1280: Memory corruption in skia

* CVE-2015-1281: CSP bypass

* CVE-2015-1282: Use-after-free in pdfium

* CVE-2015-1283: Heap-buffer-overflow in expat

* CVE-2015-1284: Use-after-free in blink

* CVE-2015-1286: UXSS in blink

* CVE-2015-1287: SOP bypass with CSS

* CVE-2015-1270: Uninitialized memory read in ICU

* CVE-2015-1272: Use-after-free related to unexpected GPU process

termination

* CVE-2015-1277: Use-after-free in accessibility

* CVE-2015-1278: URL spoofing using pdf files

* CVE-2015-1285: Information leak in XSS auditor

* CVE-2015-1288: Spell checking dictionaries fetched over HTTP

* CVE-2015-1289: Various fixes from internal audits, fuzzing and other

initiatives

* CVE-2015-5605: Rgular-expression implementation mishandles interrupts,

DoS via JS

 

The following non-security changes are included:

 

* A number of new apps/extension APIs

* Lots of under the hood changes for stability and performance

* Pepper Flash plugin updated to 18.0.0.209

 

 

Patch Instructions:

 

To install this openSUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- openSUSE 13.2:

 

zypper in -t patch openSUSE-2015-513=1

 

- openSUSE 13.1:

 

zypper in -t patch openSUSE-2015-513=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- openSUSE 13.2 (i586 x86_64):

 

chromedriver-44.0.2403.89-38.1

chromedriver-debuginfo-44.0.2403.89-38.1

chromium-44.0.2403.89-38.1

chromium-debuginfo-44.0.2403.89-38.1

chromium-debugsource-44.0.2403.89-38.1

chromium-desktop-gnome-44.0.2403.89-38.1

chromium-desktop-kde-44.0.2403.89-38.1

chromium-ffmpegsumo-44.0.2403.89-38.1

chromium-ffmpegsumo-debuginfo-44.0.2403.89-38.1

 

- openSUSE 13.1 (i586 x86_64):

 

chromedriver-44.0.2403.89-93.1

chromedriver-debuginfo-44.0.2403.89-93.1

chromium-44.0.2403.89-93.1

chromium-debuginfo-44.0.2403.89-93.1

chromium-debugsource-44.0.2403.89-93.1

chromium-desktop-gnome-44.0.2403.89-93.1

chromium-desktop-kde-44.0.2403.89-93.1

chromium-ffmpegsumo-44.0.2403.89-93.1

chromium-ffmpegsumo-debuginfo-44.0.2403.89-93.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2015-1270.html

https://www.suse.com/security/cve/CVE-2015-1271.html

https://www.suse.com/security/cve/CVE-2015-1272.html

https://www.suse.com/security/cve/CVE-2015-1273.html

https://www.suse.com/security/cve/CVE-2015-1274.html

https://www.suse.com/security/cve/CVE-2015-1275.html

https://www.suse.com/security/cve/CVE-2015-1276.html

https://www.suse.com/security/cve/CVE-2015-1277.html

https://www.suse.com/security/cve/CVE-2015-1278.html

https://www.suse.com/security/cve/CVE-2015-1279.html

https://www.suse.com/security/cve/CVE-2015-1280.html

https://www.suse.com/security/cve/CVE-2015-1281.html

https://www.suse.com/security/cve/CVE-2015-1282.html

https://www.suse.com/security/cve/CVE-2015-1283.html

https://www.suse.com/security/cve/CVE-2015-1284.html

https://www.suse.com/security/cve/CVE-2015-1285.html

https://www.suse.com/security/cve/CVE-2015-1286.html

https://www.suse.com/security/cve/CVE-2015-1287.html

https://www.suse.com/security/cve/CVE-2015-1288.html

https://www.suse.com/security/cve/CVE-2015-1289.html

https://www.suse.com/security/cve/CVE-2015-5605.html

https://bugzilla.suse.com/939077

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×