You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Chromium

Sigurnosni nedostaci programskog paketa Chromium

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for Chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2054-1
Rating: important
References: #1070421 #1093031 #1095163 #1095545 #1096508
#1097452
Cross-References: CVE-2018-6123 CVE-2018-6124 CVE-2018-6125
CVE-2018-6126 CVE-2018-6127 CVE-2018-6128
CVE-2018-6129 CVE-2018-6130 CVE-2018-6131
CVE-2018-6132 CVE-2018-6133 CVE-2018-6134
CVE-2018-6135 CVE-2018-6136 CVE-2018-6137
CVE-2018-6138 CVE-2018-6139 CVE-2018-6140
CVE-2018-6141 CVE-2018-6142 CVE-2018-6143
CVE-2018-6144 CVE-2018-6145 CVE-2018-6147
CVE-2018-6148 CVE-2018-6149
Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes 26 vulnerabilities is now available.

Description:

This update for Chromium to version 67.0.3396.99 fixes multiple issues.

Security issues fixed (bsc#1095163):

– CVE-2018-6123: Use after free in Blink
– CVE-2018-6124: Type confusion in Blink
– CVE-2018-6125: Overly permissive policy in WebUSB
– CVE-2018-6126: Heap buffer overflow in Skia
– CVE-2018-6127: Use after free in indexedDB
– CVE-2018-6129: Out of bounds memory access in WebRTC
– CVE-2018-6130: Out of bounds memory access in WebRTC
– CVE-2018-6131: Incorrect mutability protection in WebAssembly
– CVE-2018-6132: Use of uninitialized memory in WebRTC
– CVE-2018-6133: URL spoof in Omnibox
– CVE-2018-6134: Referrer Policy bypass in Blink
– CVE-2018-6135: UI spoofing in Blink
– CVE-2018-6136: Out of bounds memory access in V8
– CVE-2018-6137: Leak of visited status of page in Blink
– CVE-2018-6138: Overly permissive policy in Extensions
– CVE-2018-6139: Restrictions bypass in the debugger extension API
– CVE-2018-6140: Restrictions bypass in the debugger extension API
– CVE-2018-6141: Heap buffer overflow in Skia
– CVE-2018-6142: Out of bounds memory access in V8
– CVE-2018-6143: Out of bounds memory access in V8
– CVE-2018-6144: Out of bounds memory access in PDFium
– CVE-2018-6145: Incorrect escaping of MathML in Blink
– CVE-2018-6147: Password fields not taking advantage of OS protections in
Views
– CVE-2018-6148: Incorrect handling of CSP header (boo#1096508)
– CVE-2018-6149: Out of bounds write in V8 (boo#1097452)

The following tracked packaging changes are included:

– Require ffmpeg >= 4.0 (boo#1095545)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2018-759=1

Package List:

– SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):

chromedriver-67.0.3396.99-58.2
chromium-67.0.3396.99-58.2

References:

https://www.suse.com/security/cve/CVE-2018-6123.html
https://www.suse.com/security/cve/CVE-2018-6124.html
https://www.suse.com/security/cve/CVE-2018-6125.html
https://www.suse.com/security/cve/CVE-2018-6126.html
https://www.suse.com/security/cve/CVE-2018-6127.html
https://www.suse.com/security/cve/CVE-2018-6128.html
https://www.suse.com/security/cve/CVE-2018-6129.html
https://www.suse.com/security/cve/CVE-2018-6130.html
https://www.suse.com/security/cve/CVE-2018-6131.html
https://www.suse.com/security/cve/CVE-2018-6132.html
https://www.suse.com/security/cve/CVE-2018-6133.html
https://www.suse.com/security/cve/CVE-2018-6134.html
https://www.suse.com/security/cve/CVE-2018-6135.html
https://www.suse.com/security/cve/CVE-2018-6136.html
https://www.suse.com/security/cve/CVE-2018-6137.html
https://www.suse.com/security/cve/CVE-2018-6138.html
https://www.suse.com/security/cve/CVE-2018-6139.html
https://www.suse.com/security/cve/CVE-2018-6140.html
https://www.suse.com/security/cve/CVE-2018-6141.html
https://www.suse.com/security/cve/CVE-2018-6142.html
https://www.suse.com/security/cve/CVE-2018-6143.html
https://www.suse.com/security/cve/CVE-2018-6144.html
https://www.suse.com/security/cve/CVE-2018-6145.html
https://www.suse.com/security/cve/CVE-2018-6147.html
https://www.suse.com/security/cve/CVE-2018-6148.html
https://www.suse.com/security/cve/CVE-2018-6149.html
https://bugzilla.suse.com/1070421
https://bugzilla.suse.com/1093031
https://bugzilla.suse.com/1095163
https://bugzilla.suse.com/1095545
https://bugzilla.suse.com/1096508
https://bugzilla.suse.com/1097452


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for Chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:2055-1
Rating: important
References: #1070421 #1093031 #1095163 #1095545 #1096508
#1097452
Cross-References: CVE-2018-6123 CVE-2018-6124 CVE-2018-6125
CVE-2018-6126 CVE-2018-6127 CVE-2018-6128
CVE-2018-6129 CVE-2018-6130 CVE-2018-6131
CVE-2018-6132 CVE-2018-6133 CVE-2018-6134
CVE-2018-6135 CVE-2018-6136 CVE-2018-6137
CVE-2018-6138 CVE-2018-6139 CVE-2018-6140
CVE-2018-6141 CVE-2018-6142 CVE-2018-6143
CVE-2018-6144 CVE-2018-6145 CVE-2018-6147
CVE-2018-6148 CVE-2018-6149
Affected Products:
openSUSE Leap 42.3
openSUSE Leap 15.0
______________________________________________________________________________

An update that fixes 26 vulnerabilities is now available.

Description:

This update for Chromium to version 67.0.3396.99 fixes multiple issues.

Security issues fixed (bsc#1095163):

– CVE-2018-6123: Use after free in Blink
– CVE-2018-6124: Type confusion in Blink
– CVE-2018-6125: Overly permissive policy in WebUSB
– CVE-2018-6126: Heap buffer overflow in Skia
– CVE-2018-6127: Use after free in indexedDB
– CVE-2018-6129: Out of bounds memory access in WebRTC
– CVE-2018-6130: Out of bounds memory access in WebRTC
– CVE-2018-6131: Incorrect mutability protection in WebAssembly
– CVE-2018-6132: Use of uninitialized memory in WebRTC
– CVE-2018-6133: URL spoof in Omnibox
– CVE-2018-6134: Referrer Policy bypass in Blink
– CVE-2018-6135: UI spoofing in Blink
– CVE-2018-6136: Out of bounds memory access in V8
– CVE-2018-6137: Leak of visited status of page in Blink
– CVE-2018-6138: Overly permissive policy in Extensions
– CVE-2018-6139: Restrictions bypass in the debugger extension API
– CVE-2018-6140: Restrictions bypass in the debugger extension API
– CVE-2018-6141: Heap buffer overflow in Skia
– CVE-2018-6142: Out of bounds memory access in V8
– CVE-2018-6143: Out of bounds memory access in V8
– CVE-2018-6144: Out of bounds memory access in PDFium
– CVE-2018-6145: Incorrect escaping of MathML in Blink
– CVE-2018-6147: Password fields not taking advantage of OS protections in
Views
– CVE-2018-6148: Incorrect handling of CSP header (boo#1096508)
– CVE-2018-6149: Out of bounds write in V8 (boo#1097452)

The following tracked packaging changes are included:

– Require ffmpeg >= 4.0 (boo#1095545)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-759=1

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-759=1

Package List:

– openSUSE Leap 42.3 (x86_64):

chromedriver-67.0.3396.99-161.4
chromedriver-debuginfo-67.0.3396.99-161.4
chromium-67.0.3396.99-161.4
chromium-debuginfo-67.0.3396.99-161.4
chromium-debugsource-67.0.3396.99-161.4

– openSUSE Leap 15.0 (x86_64):

chromedriver-67.0.3396.99-lp150.2.3.3
chromedriver-debuginfo-67.0.3396.99-lp150.2.3.3
chromium-67.0.3396.99-lp150.2.3.3
chromium-debuginfo-67.0.3396.99-lp150.2.3.3
chromium-debugsource-67.0.3396.99-lp150.2.3.3

References:

https://www.suse.com/security/cve/CVE-2018-6123.html
https://www.suse.com/security/cve/CVE-2018-6124.html
https://www.suse.com/security/cve/CVE-2018-6125.html
https://www.suse.com/security/cve/CVE-2018-6126.html
https://www.suse.com/security/cve/CVE-2018-6127.html
https://www.suse.com/security/cve/CVE-2018-6128.html
https://www.suse.com/security/cve/CVE-2018-6129.html
https://www.suse.com/security/cve/CVE-2018-6130.html
https://www.suse.com/security/cve/CVE-2018-6131.html
https://www.suse.com/security/cve/CVE-2018-6132.html
https://www.suse.com/security/cve/CVE-2018-6133.html
https://www.suse.com/security/cve/CVE-2018-6134.html
https://www.suse.com/security/cve/CVE-2018-6135.html
https://www.suse.com/security/cve/CVE-2018-6136.html
https://www.suse.com/security/cve/CVE-2018-6137.html
https://www.suse.com/security/cve/CVE-2018-6138.html
https://www.suse.com/security/cve/CVE-2018-6139.html
https://www.suse.com/security/cve/CVE-2018-6140.html
https://www.suse.com/security/cve/CVE-2018-6141.html
https://www.suse.com/security/cve/CVE-2018-6142.html
https://www.suse.com/security/cve/CVE-2018-6143.html
https://www.suse.com/security/cve/CVE-2018-6144.html
https://www.suse.com/security/cve/CVE-2018-6145.html
https://www.suse.com/security/cve/CVE-2018-6147.html
https://www.suse.com/security/cve/CVE-2018-6148.html
https://www.suse.com/security/cve/CVE-2018-6149.html
https://bugzilla.suse.com/1070421
https://bugzilla.suse.com/1093031
https://bugzilla.suse.com/1095163
https://bugzilla.suse.com/1095545
https://bugzilla.suse.com/1096508
https://bugzilla.suse.com/1097452


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa ant

Otkriven je sigurnosni nedostatak u programskom paketu ant za operacijski sustav Debian. Otkriveni nedostatak potencijalnim napadačima omogućuje prepisivanje proizvoljnih datoteka...

Close