You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa chromium

Sigurnosni nedostaci programskog paketa chromium

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2482-1
Rating: important
References: #1057364
Cross-References: CVE-2017-5111 CVE-2017-5112 CVE-2017-5113
CVE-2017-5114 CVE-2017-5115 CVE-2017-5116
CVE-2017-5117 CVE-2017-5118 CVE-2017-5119
CVE-2017-5120
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes 10 vulnerabilities is now available.

Description:

This update for chromium to version 61.0.3163.79 fixes several issues.

These security issues were fixed:

– CVE-2017-5111: Use after free in PDFium (boo#1057364).
– CVE-2017-5112: Heap buffer overflow in WebGL (boo#1057364).
– CVE-2017-5113: Heap buffer overflow in Skia (boo#1057364).
– CVE-2017-5114: Memory lifecycle issue in PDFium (boo#1057364).
– CVE-2017-5115: Type confusion in V8 (boo#1057364).
– CVE-2017-5116: Type confusion in V8 (boo#1057364).
– CVE-2017-5117: Use of uninitialized value in Skia (boo#1057364).
– CVE-2017-5118: Bypass of Content Security Policy in Blink (boo#1057364).
– CVE-2017-5119: Use of uninitialized value in Skia (boo#1057364).
– CVE-2017-5120: Potential HTTPS downgrade during redirect navigation
(boo#1057364).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2017-1047=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):

chromedriver-61.0.3163.79-29.1
chromedriver-debuginfo-61.0.3163.79-29.1
chromium-61.0.3163.79-29.1
chromium-debuginfo-61.0.3163.79-29.1
chromium-debugsource-61.0.3163.79-29.1

References:

https://www.suse.com/security/cve/CVE-2017-5111.html
https://www.suse.com/security/cve/CVE-2017-5112.html
https://www.suse.com/security/cve/CVE-2017-5113.html
https://www.suse.com/security/cve/CVE-2017-5114.html
https://www.suse.com/security/cve/CVE-2017-5115.html
https://www.suse.com/security/cve/CVE-2017-5116.html
https://www.suse.com/security/cve/CVE-2017-5117.html
https://www.suse.com/security/cve/CVE-2017-5118.html
https://www.suse.com/security/cve/CVE-2017-5119.html
https://www.suse.com/security/cve/CVE-2017-5120.html
https://bugzilla.suse.com/1057364


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2017:2491-1
Rating: important
References: #1057364
Cross-References: CVE-2017-5111 CVE-2017-5112 CVE-2017-5113
CVE-2017-5114 CVE-2017-5115 CVE-2017-5116
CVE-2017-5117 CVE-2017-5118 CVE-2017-5119
CVE-2017-5120
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 42.2
______________________________________________________________________________

An update that fixes 10 vulnerabilities is now available.

Description:

This update for chromium to version 61.0.3163.79 fixes several issues.

These security issues were fixed:

– CVE-2017-5111: Use after free in PDFium (boo#1057364).
– CVE-2017-5112: Heap buffer overflow in WebGL (boo#1057364).
– CVE-2017-5113: Heap buffer overflow in Skia (boo#1057364).
– CVE-2017-5114: Memory lifecycle issue in PDFium (boo#1057364).
– CVE-2017-5115: Type confusion in V8 (boo#1057364).
– CVE-2017-5116: Type confusion in V8 (boo#1057364).
– CVE-2017-5117: Use of uninitialized value in Skia (boo#1057364).
– CVE-2017-5118: Bypass of Content Security Policy in Blink (boo#1057364).
– CVE-2017-5119: Use of uninitialized value in Skia (boo#1057364).
– CVE-2017-5120: Potential HTTPS downgrade during redirect navigation
(boo#1057364).

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2017-1047=1

– openSUSE Leap 42.2:

zypper in -t patch openSUSE-2017-1047=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– openSUSE Leap 42.3 (x86_64):

chromedriver-61.0.3163.79-110.1
chromedriver-debuginfo-61.0.3163.79-110.1
chromium-61.0.3163.79-110.1
chromium-debuginfo-61.0.3163.79-110.1
chromium-debugsource-61.0.3163.79-110.1

– openSUSE Leap 42.2 (x86_64):

chromedriver-61.0.3163.79-104.24.1
chromedriver-debuginfo-61.0.3163.79-104.24.1
chromium-61.0.3163.79-104.24.1
chromium-debuginfo-61.0.3163.79-104.24.1
chromium-debugsource-61.0.3163.79-104.24.1

References:

https://www.suse.com/security/cve/CVE-2017-5111.html
https://www.suse.com/security/cve/CVE-2017-5112.html
https://www.suse.com/security/cve/CVE-2017-5113.html
https://www.suse.com/security/cve/CVE-2017-5114.html
https://www.suse.com/security/cve/CVE-2017-5115.html
https://www.suse.com/security/cve/CVE-2017-5116.html
https://www.suse.com/security/cve/CVE-2017-5117.html
https://www.suse.com/security/cve/CVE-2017-5118.html
https://www.suse.com/security/cve/CVE-2017-5119.html
https://www.suse.com/security/cve/CVE-2017-5120.html
https://bugzilla.suse.com/1057364


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-09-0100-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa python-django

Otkriven je sigurnosni nedostatak u programskom paketu python-django za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje XSS napada....

Close