A chromium security update has been released for SUSE Linux Enterprise 15 SP1
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:2694-1
Rating: important
References: #1158982
Cross-References: CVE-2019-13725 CVE-2019-13726 CVE-2019-13727
CVE-2019-13728 CVE-2019-13729 CVE-2019-13730
CVE-2019-13732 CVE-2019-13734 CVE-2019-13735
CVE-2019-13736 CVE-2019-13737 CVE-2019-13738
CVE-2019-13739 CVE-2019-13740 CVE-2019-13741
CVE-2019-13742 CVE-2019-13743 CVE-2019-13744
CVE-2019-13745 CVE-2019-13746 CVE-2019-13747
CVE-2019-13748 CVE-2019-13749 CVE-2019-13750
CVE-2019-13751 CVE-2019-13752 CVE-2019-13753
CVE-2019-13754 CVE-2019-13755 CVE-2019-13756
CVE-2019-13757 CVE-2019-13758 CVE-2019-13759
CVE-2019-13761 CVE-2019-13762 CVE-2019-13763
CVE-2019-13764
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes 37 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium was updated to 79.0.3945.79 (boo#1158982)
- CVE-2019-13725: Fixed a use after free in Bluetooth
- CVE-2019-13726: Fixed a heap buffer overflow in password manager
- CVE-2019-13727: Fixed an insufficient policy enforcement in WebSockets
- CVE-2019-13728: Fixed an out of bounds write in V8
- CVE-2019-13729: Fixed a use after free in WebSockets
- CVE-2019-13730: Fixed a type Confusion in V8
- CVE-2019-13732: Fixed a use after free in WebAudio
- CVE-2019-13734: Fixed an out of bounds write in SQLite
- CVE-2019-13735: Fixed an out of bounds write in V8
- CVE-2019-13764: Fixed a type Confusion in V8
- CVE-2019-13736: Fixed an integer overflow in PDFium
- CVE-2019-13737: Fixed an insufficient policy enforcement in autocomplete
- CVE-2019-13738: Fixed an insufficient policy enforcement in navigation
- CVE-2019-13739: Fixed an incorrect security UI in Omnibox
- CVE-2019-13740: Fixed an incorrect security UI in sharing
- CVE-2019-13741: Fixed an insufficient validation of untrusted input in
Blink
- CVE-2019-13742: Fixed an incorrect security UI in Omnibox
- CVE-2019-13743: Fixed an incorrect security UI in external protocol
handling
- CVE-2019-13744: Fixed an insufficient policy enforcement in cookies
- CVE-2019-13745: Fixed an insufficient policy enforcement in audio
- CVE-2019-13746: Fixed an insufficient policy enforcement in Omnibox
- CVE-2019-13747: Fixed an uninitialized Use in rendering
- CVE-2019-13748: Fixed an insufficient policy enforcement in developer
tools
- CVE-2019-13749: Fixed an incorrect security UI in Omnibox
- CVE-2019-13750: Fixed an insufficient data validation in SQLite
- CVE-2019-13751: Fixed an uninitialized Use in SQLite
- CVE-2019-13752: Fixed an out of bounds read in SQLite
- CVE-2019-13753: Fixed an out of bounds read in SQLite
- CVE-2019-13754: Fixed an insufficient policy enforcement in extensions
- CVE-2019-13755: Fixed an insufficient policy enforcement in extensions
- CVE-2019-13756: Fixed an incorrect security UI in printing
- CVE-2019-13757: Fixed an incorrect security UI in Omnibox
- CVE-2019-13758: Fixed an insufficient policy enforcement in navigation
- CVE-2019-13759: Fixed an incorrect security UI in interstitials
- CVE-2019-13761: Fixed an incorrect security UI in Omnibox
- CVE-2019-13762: Fixed an insufficient policy enforcement in downloads
- CVE-2019-13763: Fixed an insufficient policy enforcement in payments
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-2694=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 x86_64):
chromedriver-79.0.3945.79-bp151.3.35.1
chromium-79.0.3945.79-bp151.3.35.1
References:
https://www.suse.com/security/cve/CVE-2019-13725.html
https://www.suse.com/security/cve/CVE-2019-13726.html
https://www.suse.com/security/cve/CVE-2019-13727.html
https://www.suse.com/security/cve/CVE-2019-13728.html
https://www.suse.com/security/cve/CVE-2019-13729.html
https://www.suse.com/security/cve/CVE-2019-13730.html
https://www.suse.com/security/cve/CVE-2019-13732.html
https://www.suse.com/security/cve/CVE-2019-13734.html
https://www.suse.com/security/cve/CVE-2019-13735.html
https://www.suse.com/security/cve/CVE-2019-13736.html
https://www.suse.com/security/cve/CVE-2019-13737.html
https://www.suse.com/security/cve/CVE-2019-13738.html
https://www.suse.com/security/cve/CVE-2019-13739.html
https://www.suse.com/security/cve/CVE-2019-13740.html
https://www.suse.com/security/cve/CVE-2019-13741.html
https://www.suse.com/security/cve/CVE-2019-13742.html
https://www.suse.com/security/cve/CVE-2019-13743.html
https://www.suse.com/security/cve/CVE-2019-13744.html
https://www.suse.com/security/cve/CVE-2019-13745.html
https://www.suse.com/security/cve/CVE-2019-13746.html
https://www.suse.com/security/cve/CVE-2019-13747.html
https://www.suse.com/security/cve/CVE-2019-13748.html
https://www.suse.com/security/cve/CVE-2019-13749.html
https://www.suse.com/security/cve/CVE-2019-13750.html
https://www.suse.com/security/cve/CVE-2019-13751.html
https://www.suse.com/security/cve/CVE-2019-13752.html
https://www.suse.com/security/cve/CVE-2019-13753.html
https://www.suse.com/security/cve/CVE-2019-13754.html
https://www.suse.com/security/cve/CVE-2019-13755.html
https://www.suse.com/security/cve/CVE-2019-13756.html
https://www.suse.com/security/cve/CVE-2019-13757.html
https://www.suse.com/security/cve/CVE-2019-13758.html
https://www.suse.com/security/cve/CVE-2019-13759.html
https://www.suse.com/security/cve/CVE-2019-13761.html
https://www.suse.com/security/cve/CVE-2019-13762.html
https://www.suse.com/security/cve/CVE-2019-13763.html
https://www.suse.com/security/cve/CVE-2019-13764.html
https://bugzilla.suse.com/1158982