You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Chromium

Sigurnosni nedostaci programskog paketa Chromium

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for Chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4143-1
Rating: important
References: #1118529 #1119364
Cross-References: CVE-2018-17480 CVE-2018-17481 CVE-2018-18335
CVE-2018-18336 CVE-2018-18337 CVE-2018-18338
CVE-2018-18339 CVE-2018-18340 CVE-2018-18341
CVE-2018-18342 CVE-2018-18343 CVE-2018-18344
CVE-2018-18345 CVE-2018-18346 CVE-2018-18347
CVE-2018-18348 CVE-2018-18349 CVE-2018-18350
CVE-2018-18351 CVE-2018-18352 CVE-2018-18353
CVE-2018-18354 CVE-2018-18355 CVE-2018-18356
CVE-2018-18357 CVE-2018-18358 CVE-2018-18359

Affected Products:
SUSE Package Hub for SUSE Linux Enterprise 12
______________________________________________________________________________

An update that fixes 27 vulnerabilities is now available.

Description:

This update to Chromium 71.0.3578.98 fixes the following issues:

Security issues fixed (boo#1118529):

– CVE-2018-17480: Out of bounds write in V8
– CVE-2018-17481: Use after frees in PDFium
– CVE-2018-18335: Heap buffer overflow in Skia
– CVE-2018-18336: Use after free in PDFium
– CVE-2018-18337: Use after free in Blink
– CVE-2018-18338: Heap buffer overflow in Canvas
– CVE-2018-18339: Use after free in WebAudio
– CVE-2018-18340: Use after free in MediaRecorder
– CVE-2018-18341: Heap buffer overflow in Blink
– CVE-2018-18342: Out of bounds write in V8
– CVE-2018-18343: Use after free in Skia
– CVE-2018-18344: Inappropriate implementation in Extensions
– Multiple issues in SQLite via WebSQL
– CVE-2018-18345: Inappropriate implementation in Site Isolation
– CVE-2018-18346: Incorrect security UI in Blink
– CVE-2018-18347: Inappropriate implementation in Navigation
– CVE-2018-18348: Inappropriate implementation in Omnibox
– CVE-2018-18349: Insufficient policy enforcement in Blink
– CVE-2018-18350: Insufficient policy enforcement in Blink
– CVE-2018-18351: Insufficient policy enforcement in Navigation
– CVE-2018-18352: Inappropriate implementation in Media
– CVE-2018-18353: Inappropriate implementation in Network Authentication
– CVE-2018-18354: Insufficient data validation in Shell Integration
– CVE-2018-18355: Insufficient policy enforcement in URL Formatter
– CVE-2018-18356: Use after free in Skia
– CVE-2018-18357: Insufficient policy enforcement in URL Formatter
– CVE-2018-18358: Insufficient policy enforcement in Proxy
– CVE-2018-18359: Out of bounds read in V8
– Inappropriate implementation in PDFium
– Use after free in Extensions
– Inappropriate implementation in Navigation
– Insufficient policy enforcement in Navigation
– Insufficient policy enforcement in URL Formatter
– Various fixes from internal audits, fuzzing and other initiatives
– CVE-2018-17481: Use after free in PDFium (boo#1119364)

The following changes are included:

– advertisements posing as error messages are now blocked
– Automatic playing of content at page load mostly disabled
– New JavaScript API for relative time display

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– SUSE Package Hub for SUSE Linux Enterprise 12:

zypper in -t patch openSUSE-2018-1558=1

Package List:

– SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64):

chromedriver-71.0.3578.98-80.1
chromium-71.0.3578.98-80.1

References:

https://www.suse.com/security/cve/CVE-2018-17480.html
https://www.suse.com/security/cve/CVE-2018-17481.html
https://www.suse.com/security/cve/CVE-2018-18335.html
https://www.suse.com/security/cve/CVE-2018-18336.html
https://www.suse.com/security/cve/CVE-2018-18337.html
https://www.suse.com/security/cve/CVE-2018-18338.html
https://www.suse.com/security/cve/CVE-2018-18339.html
https://www.suse.com/security/cve/CVE-2018-18340.html
https://www.suse.com/security/cve/CVE-2018-18341.html
https://www.suse.com/security/cve/CVE-2018-18342.html
https://www.suse.com/security/cve/CVE-2018-18343.html
https://www.suse.com/security/cve/CVE-2018-18344.html
https://www.suse.com/security/cve/CVE-2018-18345.html
https://www.suse.com/security/cve/CVE-2018-18346.html
https://www.suse.com/security/cve/CVE-2018-18347.html
https://www.suse.com/security/cve/CVE-2018-18348.html
https://www.suse.com/security/cve/CVE-2018-18349.html
https://www.suse.com/security/cve/CVE-2018-18350.html
https://www.suse.com/security/cve/CVE-2018-18351.html
https://www.suse.com/security/cve/CVE-2018-18352.html
https://www.suse.com/security/cve/CVE-2018-18353.html
https://www.suse.com/security/cve/CVE-2018-18354.html
https://www.suse.com/security/cve/CVE-2018-18355.html
https://www.suse.com/security/cve/CVE-2018-18356.html
https://www.suse.com/security/cve/CVE-2018-18357.html
https://www.suse.com/security/cve/CVE-2018-18358.html
https://www.suse.com/security/cve/CVE-2018-18359.html
https://bugzilla.suse.com/1118529
https://bugzilla.suse.com/1119364


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for Chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4142-1
Rating: important
References: #1118529 #1119364
Cross-References: CVE-2018-17480 CVE-2018-17481 CVE-2018-18335
CVE-2018-18336 CVE-2018-18337 CVE-2018-18338
CVE-2018-18339 CVE-2018-18340 CVE-2018-18341
CVE-2018-18342 CVE-2018-18343 CVE-2018-18344
CVE-2018-18345 CVE-2018-18346 CVE-2018-18347
CVE-2018-18348 CVE-2018-18349 CVE-2018-18350
CVE-2018-18351 CVE-2018-18352 CVE-2018-18353
CVE-2018-18354 CVE-2018-18355 CVE-2018-18356
CVE-2018-18357 CVE-2018-18358 CVE-2018-18359

Affected Products:
openSUSE Leap 42.3
______________________________________________________________________________

An update that fixes 27 vulnerabilities is now available.

Description:

This update to Chromium 71.0.3578.98 fixes the following issues:

Security issues fixed (boo#1118529):

– CVE-2018-17480: Out of bounds write in V8
– CVE-2018-17481: Use after frees in PDFium
– CVE-2018-18335: Heap buffer overflow in Skia
– CVE-2018-18336: Use after free in PDFium
– CVE-2018-18337: Use after free in Blink
– CVE-2018-18338: Heap buffer overflow in Canvas
– CVE-2018-18339: Use after free in WebAudio
– CVE-2018-18340: Use after free in MediaRecorder
– CVE-2018-18341: Heap buffer overflow in Blink
– CVE-2018-18342: Out of bounds write in V8
– CVE-2018-18343: Use after free in Skia
– CVE-2018-18344: Inappropriate implementation in Extensions
– Multiple issues in SQLite via WebSQL
– CVE-2018-18345: Inappropriate implementation in Site Isolation
– CVE-2018-18346: Incorrect security UI in Blink
– CVE-2018-18347: Inappropriate implementation in Navigation
– CVE-2018-18348: Inappropriate implementation in Omnibox
– CVE-2018-18349: Insufficient policy enforcement in Blink
– CVE-2018-18350: Insufficient policy enforcement in Blink
– CVE-2018-18351: Insufficient policy enforcement in Navigation
– CVE-2018-18352: Inappropriate implementation in Media
– CVE-2018-18353: Inappropriate implementation in Network Authentication
– CVE-2018-18354: Insufficient data validation in Shell Integration
– CVE-2018-18355: Insufficient policy enforcement in URL Formatter
– CVE-2018-18356: Use after free in Skia
– CVE-2018-18357: Insufficient policy enforcement in URL Formatter
– CVE-2018-18358: Insufficient policy enforcement in Proxy
– CVE-2018-18359: Out of bounds read in V8
– Inappropriate implementation in PDFium
– Use after free in Extensions
– Inappropriate implementation in Navigation
– Insufficient policy enforcement in Navigation
– Insufficient policy enforcement in URL Formatter
– Various fixes from internal audits, fuzzing and other initiatives
– CVE-2018-17481: Use after free in PDFium (boo#1119364)

The following changes are included:

– advertisements posing as error messages are now blocked
– Automatic playing of content at page load mostly disabled
– New JavaScript API for relative time display

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1557=1

Package List:

– openSUSE Leap 42.3 (x86_64):

chromedriver-71.0.3578.98-189.1
chromedriver-debuginfo-71.0.3578.98-189.1
chromium-71.0.3578.98-189.1
chromium-debuginfo-71.0.3578.98-189.1
chromium-debugsource-71.0.3578.98-189.1

References:

https://www.suse.com/security/cve/CVE-2018-17480.html
https://www.suse.com/security/cve/CVE-2018-17481.html
https://www.suse.com/security/cve/CVE-2018-18335.html
https://www.suse.com/security/cve/CVE-2018-18336.html
https://www.suse.com/security/cve/CVE-2018-18337.html
https://www.suse.com/security/cve/CVE-2018-18338.html
https://www.suse.com/security/cve/CVE-2018-18339.html
https://www.suse.com/security/cve/CVE-2018-18340.html
https://www.suse.com/security/cve/CVE-2018-18341.html
https://www.suse.com/security/cve/CVE-2018-18342.html
https://www.suse.com/security/cve/CVE-2018-18343.html
https://www.suse.com/security/cve/CVE-2018-18344.html
https://www.suse.com/security/cve/CVE-2018-18345.html
https://www.suse.com/security/cve/CVE-2018-18346.html
https://www.suse.com/security/cve/CVE-2018-18347.html
https://www.suse.com/security/cve/CVE-2018-18348.html
https://www.suse.com/security/cve/CVE-2018-18349.html
https://www.suse.com/security/cve/CVE-2018-18350.html
https://www.suse.com/security/cve/CVE-2018-18351.html
https://www.suse.com/security/cve/CVE-2018-18352.html
https://www.suse.com/security/cve/CVE-2018-18353.html
https://www.suse.com/security/cve/CVE-2018-18354.html
https://www.suse.com/security/cve/CVE-2018-18355.html
https://www.suse.com/security/cve/CVE-2018-18356.html
https://www.suse.com/security/cve/CVE-2018-18357.html
https://www.suse.com/security/cve/CVE-2018-18358.html
https://www.suse.com/security/cve/CVE-2018-18359.html
https://bugzilla.suse.com/1118529
https://bugzilla.suse.com/1119364


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

openSUSE Security Update: Security update for Chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2018:4122-1
Rating: important
References: #1119364
Cross-References: CVE-2018-17481
Affected Products:
openSUSE Leap 15.0
openSUSE Backports SLE-15
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update to Chromium 71.0.3578.98 fixes on security issue.

– CVE-2018-17481: Use after free in PDFium – a follow-up fix to Chromiun
70 (boo#1119364)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.0:

zypper in -t patch openSUSE-2018-1546=1

– openSUSE Backports SLE-15:

zypper in -t patch openSUSE-2018-1546=1

Package List:

– openSUSE Leap 15.0 (x86_64):

chromedriver-71.0.3578.98-lp150.2.33.1
chromedriver-debuginfo-71.0.3578.98-lp150.2.33.1
chromium-71.0.3578.98-lp150.2.33.1
chromium-debuginfo-71.0.3578.98-lp150.2.33.1
chromium-debugsource-71.0.3578.98-lp150.2.33.1

– openSUSE Backports SLE-15 (aarch64 x86_64):

chromedriver-71.0.3578.98-bp150.2.26.1
chromedriver-debuginfo-71.0.3578.98-bp150.2.26.1
chromium-71.0.3578.98-bp150.2.26.1
chromium-debuginfo-71.0.3578.98-bp150.2.26.1
chromium-debugsource-71.0.3578.98-bp150.2.26.1

References:

https://www.suse.com/security/cve/CVE-2018-17481.html
https://bugzilla.suse.com/1119364


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorJosip Papratovic
Cert idNCERT-REF-2018-12-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa qemu

Otkriven je sigurnosni nedostatak u programskom paketu qemu za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja...

Close