openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID:    openSUSE-SU-2019:2692-1
Rating:             important
References:         #1158982 
Cross-References:   CVE-2019-13725 CVE-2019-13726 CVE-2019-13727
                    CVE-2019-13728 CVE-2019-13729 CVE-2019-13730
                    CVE-2019-13732 CVE-2019-13734 CVE-2019-13735
                    CVE-2019-13736 CVE-2019-13737 CVE-2019-13738
                    CVE-2019-13739 CVE-2019-13740 CVE-2019-13741
                    CVE-2019-13742 CVE-2019-13743 CVE-2019-13744
                    CVE-2019-13745 CVE-2019-13746 CVE-2019-13747
                    CVE-2019-13748 CVE-2019-13749 CVE-2019-13750
                    CVE-2019-13751 CVE-2019-13752 CVE-2019-13753
                    CVE-2019-13754 CVE-2019-13755 CVE-2019-13756
                    CVE-2019-13757 CVE-2019-13758 CVE-2019-13759
                    CVE-2019-13761 CVE-2019-13762 CVE-2019-13763
                    CVE-2019-13764
Affected Products:
                    openSUSE Leap 15.1
                    openSUSE Backports SLE-15
                    SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 37 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium was updated to 79.0.3945.79 (boo#1158982)
   –  CVE-2019-13725: Fixed a use after free in Bluetooth
   –  CVE-2019-13726: Fixed a heap buffer overflow in password manager
   –  CVE-2019-13727: Fixed an insufficient policy enforcement in WebSockets
   –  CVE-2019-13728: Fixed an out of bounds write in V8
   –  CVE-2019-13729: Fixed a use after free in WebSockets
   –  CVE-2019-13730: Fixed a type Confusion in V8
   –  CVE-2019-13732: Fixed a use after free in WebAudio
   –  CVE-2019-13734: Fixed an out of bounds write in SQLite
   –  CVE-2019-13735: Fixed an out of bounds write in V8
   –  CVE-2019-13764: Fixed a type Confusion in V8
   –  CVE-2019-13736: Fixed an integer overflow in PDFium
   –  CVE-2019-13737: Fixed an insufficient policy enforcement in autocomplete
   –  CVE-2019-13738: Fixed an insufficient policy enforcement in navigation
   –  CVE-2019-13739: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13740: Fixed an incorrect security UI in sharing
   –  CVE-2019-13741: Fixed an insufficient validation of untrusted input in
      Blink
   –  CVE-2019-13742: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13743: Fixed an incorrect security UI in external protocol
      handling
   –  CVE-2019-13744: Fixed an insufficient policy enforcement in cookies
   –  CVE-2019-13745: Fixed an insufficient policy enforcement in audio
   –  CVE-2019-13746: Fixed an insufficient policy enforcement in Omnibox
   –  CVE-2019-13747: Fixed an uninitialized Use in rendering
   –  CVE-2019-13748: Fixed an insufficient policy enforcement in developer
      tools
   –  CVE-2019-13749: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13750: Fixed an insufficient data validation in SQLite
   –  CVE-2019-13751: Fixed an uninitialized Use in SQLite
   –  CVE-2019-13752: Fixed an out of bounds read in SQLite
   –  CVE-2019-13753: Fixed an out of bounds read in SQLite
   –  CVE-2019-13754: Fixed an insufficient policy enforcement in extensions
   –  CVE-2019-13755: Fixed an insufficient policy enforcement in extensions
   –  CVE-2019-13756: Fixed an incorrect security UI in printing
   –  CVE-2019-13757: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13758: Fixed an insufficient policy enforcement in navigation
   –  CVE-2019-13759: Fixed an incorrect security UI in interstitials
   –  CVE-2019-13761: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13762: Fixed an insufficient policy enforcement in downloads
   –  CVE-2019-13763: Fixed an insufficient policy enforcement in payments
Patch Instructions:
   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-2692=1
– openSUSE Backports SLE-15:
zypper in -t patch openSUSE-2019-2692=1
– SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2019-2692=1
Package List:
– openSUSE Leap 15.1 (x86_64):
      chromedriver-79.0.3945.79-lp151.2.51.1
      chromedriver-debuginfo-79.0.3945.79-lp151.2.51.1
      chromium-79.0.3945.79-lp151.2.51.1
      chromium-debuginfo-79.0.3945.79-lp151.2.51.1
      chromium-debugsource-79.0.3945.79-lp151.2.51.1
– openSUSE Backports SLE-15 (aarch64 x86_64):
      chromedriver-79.0.3945.79-bp150.252.1
      chromedriver-debuginfo-79.0.3945.79-bp150.252.1
      chromium-79.0.3945.79-bp150.252.1
      chromium-debuginfo-79.0.3945.79-bp150.252.1
      chromium-debugsource-79.0.3945.79-bp150.252.1
– SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 x86_64):
      chromedriver-79.0.3945.79-19.1
      chromedriver-debuginfo-79.0.3945.79-19.1
      chromium-79.0.3945.79-19.1
      chromium-debuginfo-79.0.3945.79-19.1
      chromium-debugsource-79.0.3945.79-19.1
References:
   https://www.suse.com/security/cve/CVE-2019-13725.html
   https://www.suse.com/security/cve/CVE-2019-13726.html
   https://www.suse.com/security/cve/CVE-2019-13727.html
   https://www.suse.com/security/cve/CVE-2019-13728.html
   https://www.suse.com/security/cve/CVE-2019-13729.html
   https://www.suse.com/security/cve/CVE-2019-13730.html
   https://www.suse.com/security/cve/CVE-2019-13732.html
   https://www.suse.com/security/cve/CVE-2019-13734.html
   https://www.suse.com/security/cve/CVE-2019-13735.html
   https://www.suse.com/security/cve/CVE-2019-13736.html
   https://www.suse.com/security/cve/CVE-2019-13737.html
   https://www.suse.com/security/cve/CVE-2019-13738.html
   https://www.suse.com/security/cve/CVE-2019-13739.html
   https://www.suse.com/security/cve/CVE-2019-13740.html
   https://www.suse.com/security/cve/CVE-2019-13741.html
   https://www.suse.com/security/cve/CVE-2019-13742.html
   https://www.suse.com/security/cve/CVE-2019-13743.html
   https://www.suse.com/security/cve/CVE-2019-13744.html
   https://www.suse.com/security/cve/CVE-2019-13745.html
   https://www.suse.com/security/cve/CVE-2019-13746.html
   https://www.suse.com/security/cve/CVE-2019-13747.html
   https://www.suse.com/security/cve/CVE-2019-13748.html
   https://www.suse.com/security/cve/CVE-2019-13749.html
   https://www.suse.com/security/cve/CVE-2019-13750.html
   https://www.suse.com/security/cve/CVE-2019-13751.html
   https://www.suse.com/security/cve/CVE-2019-13752.html
   https://www.suse.com/security/cve/CVE-2019-13753.html
   https://www.suse.com/security/cve/CVE-2019-13754.html
   https://www.suse.com/security/cve/CVE-2019-13755.html
   https://www.suse.com/security/cve/CVE-2019-13756.html
   https://www.suse.com/security/cve/CVE-2019-13757.html
   https://www.suse.com/security/cve/CVE-2019-13758.html
   https://www.suse.com/security/cve/CVE-2019-13759.html
   https://www.suse.com/security/cve/CVE-2019-13761.html
   https://www.suse.com/security/cve/CVE-2019-13762.html
   https://www.suse.com/security/cve/CVE-2019-13763.html
   https://www.suse.com/security/cve/CVE-2019-13764.html
   https://bugzilla.suse.com/1158982
— 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
   openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID:    openSUSE-SU-2019:2692-1
Rating:             important
References:         #1158982 
Cross-References:   CVE-2019-13725 CVE-2019-13726 CVE-2019-13727
                    CVE-2019-13728 CVE-2019-13729 CVE-2019-13730
                    CVE-2019-13732 CVE-2019-13734 CVE-2019-13735
                    CVE-2019-13736 CVE-2019-13737 CVE-2019-13738
                    CVE-2019-13739 CVE-2019-13740 CVE-2019-13741
                    CVE-2019-13742 CVE-2019-13743 CVE-2019-13744
                    CVE-2019-13745 CVE-2019-13746 CVE-2019-13747
                    CVE-2019-13748 CVE-2019-13749 CVE-2019-13750
                    CVE-2019-13751 CVE-2019-13752 CVE-2019-13753
                    CVE-2019-13754 CVE-2019-13755 CVE-2019-13756
                    CVE-2019-13757 CVE-2019-13758 CVE-2019-13759
                    CVE-2019-13761 CVE-2019-13762 CVE-2019-13763
                    CVE-2019-13764
Affected Products:
                    SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________
An update that fixes 37 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium was updated to 79.0.3945.79 (boo#1158982)
   –  CVE-2019-13725: Fixed a use after free in Bluetooth
   –  CVE-2019-13726: Fixed a heap buffer overflow in password manager
   –  CVE-2019-13727: Fixed an insufficient policy enforcement in WebSockets
   –  CVE-2019-13728: Fixed an out of bounds write in V8
   –  CVE-2019-13729: Fixed a use after free in WebSockets
   –  CVE-2019-13730: Fixed a type Confusion in V8
   –  CVE-2019-13732: Fixed a use after free in WebAudio
   –  CVE-2019-13734: Fixed an out of bounds write in SQLite
   –  CVE-2019-13735: Fixed an out of bounds write in V8
   –  CVE-2019-13764: Fixed a type Confusion in V8
   –  CVE-2019-13736: Fixed an integer overflow in PDFium
   –  CVE-2019-13737: Fixed an insufficient policy enforcement in autocomplete
   –  CVE-2019-13738: Fixed an insufficient policy enforcement in navigation
   –  CVE-2019-13739: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13740: Fixed an incorrect security UI in sharing
   –  CVE-2019-13741: Fixed an insufficient validation of untrusted input in
      Blink
   –  CVE-2019-13742: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13743: Fixed an incorrect security UI in external protocol
      handling
   –  CVE-2019-13744: Fixed an insufficient policy enforcement in cookies
   –  CVE-2019-13745: Fixed an insufficient policy enforcement in audio
   –  CVE-2019-13746: Fixed an insufficient policy enforcement in Omnibox
   –  CVE-2019-13747: Fixed an uninitialized Use in rendering
   –  CVE-2019-13748: Fixed an insufficient policy enforcement in developer
      tools
   –  CVE-2019-13749: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13750: Fixed an insufficient data validation in SQLite
   –  CVE-2019-13751: Fixed an uninitialized Use in SQLite
   –  CVE-2019-13752: Fixed an out of bounds read in SQLite
   –  CVE-2019-13753: Fixed an out of bounds read in SQLite
   –  CVE-2019-13754: Fixed an insufficient policy enforcement in extensions
   –  CVE-2019-13755: Fixed an insufficient policy enforcement in extensions
   –  CVE-2019-13756: Fixed an incorrect security UI in printing
   –  CVE-2019-13757: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13758: Fixed an insufficient policy enforcement in navigation
   –  CVE-2019-13759: Fixed an incorrect security UI in interstitials
   –  CVE-2019-13761: Fixed an incorrect security UI in Omnibox
   –  CVE-2019-13762: Fixed an insufficient policy enforcement in downloads
   –  CVE-2019-13763: Fixed an insufficient policy enforcement in payments
Patch Instructions:
   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
– SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2019-2692=1
Package List:
– SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 x86_64):
      chromedriver-79.0.3945.79-19.1
      chromedriver-debuginfo-79.0.3945.79-19.1
      chromium-79.0.3945.79-19.1
      chromium-debuginfo-79.0.3945.79-19.1
      chromium-debugsource-79.0.3945.79-19.1
References:
   https://www.suse.com/security/cve/CVE-2019-13725.html
   https://www.suse.com/security/cve/CVE-2019-13726.html
   https://www.suse.com/security/cve/CVE-2019-13727.html
   https://www.suse.com/security/cve/CVE-2019-13728.html
   https://www.suse.com/security/cve/CVE-2019-13729.html
   https://www.suse.com/security/cve/CVE-2019-13730.html
   https://www.suse.com/security/cve/CVE-2019-13732.html
   https://www.suse.com/security/cve/CVE-2019-13734.html
   https://www.suse.com/security/cve/CVE-2019-13735.html
   https://www.suse.com/security/cve/CVE-2019-13736.html
   https://www.suse.com/security/cve/CVE-2019-13737.html
   https://www.suse.com/security/cve/CVE-2019-13738.html
   https://www.suse.com/security/cve/CVE-2019-13739.html
   https://www.suse.com/security/cve/CVE-2019-13740.html
   https://www.suse.com/security/cve/CVE-2019-13741.html
   https://www.suse.com/security/cve/CVE-2019-13742.html
   https://www.suse.com/security/cve/CVE-2019-13743.html
   https://www.suse.com/security/cve/CVE-2019-13744.html
   https://www.suse.com/security/cve/CVE-2019-13745.html
   https://www.suse.com/security/cve/CVE-2019-13746.html
   https://www.suse.com/security/cve/CVE-2019-13747.html
   https://www.suse.com/security/cve/CVE-2019-13748.html
   https://www.suse.com/security/cve/CVE-2019-13749.html
   https://www.suse.com/security/cve/CVE-2019-13750.html
   https://www.suse.com/security/cve/CVE-2019-13751.html
   https://www.suse.com/security/cve/CVE-2019-13752.html
   https://www.suse.com/security/cve/CVE-2019-13753.html
   https://www.suse.com/security/cve/CVE-2019-13754.html
   https://www.suse.com/security/cve/CVE-2019-13755.html
   https://www.suse.com/security/cve/CVE-2019-13756.html
   https://www.suse.com/security/cve/CVE-2019-13757.html
   https://www.suse.com/security/cve/CVE-2019-13758.html
   https://www.suse.com/security/cve/CVE-2019-13759.html
   https://www.suse.com/security/cve/CVE-2019-13761.html
   https://www.suse.com/security/cve/CVE-2019-13762.html
   https://www.suse.com/security/cve/CVE-2019-13763.html
   https://www.suse.com/security/cve/CVE-2019-13764.html
   https://bugzilla.suse.com/1158982
— 
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org



