openSUSE: 2019:2155-1: important: chromium
Description
This update for chromium fixes the following issues: Security issues fixed: - CVE-2019-5870: Fixed a use-after-free in media. (boo#1150425) - CVE-2019-5871: Fixed a heap overflow in Skia. (boo#1150425) - CVE-2019-5872: Fixed a use-after-free in Mojo (boo#1150425) - CVE-2019-5874: Fixed a behavior that made external URIs trigger other browsers. (boo#1150425) - CVE-2019-5875: Fixed a URL bar spoof via download redirect. (boo#1150425) - CVE-2019-5876: Fixed a use-after-free in media (boo#1150425) - CVE-2019-5877: Fixed an out-of-bounds access in V8. (boo#1150425) - CVE-2019-5878: Fixed a use-after-free in V8. (boo#1150425) - CVE-2019-5879: Fixed an extension issue that allowed the bypass of a same origin policy. (boo#1150425) - CVE-2019-5880: Fixed a SameSite cookie bypass. (boo#1150425) - CVE-2019-5881: Fixed an arbitrary read in SwiftShader. (boo#1150425) - CVE-2019-13659: Fixed an URL spoof. (boo#1150425) - CVE-2019-13660: Fixed...
Read the Full Advisory
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15: zypper in -t patch openSUSE-2019-2155=1
Package List
- openSUSE Backports SLE-15 (aarch64 x86_64): chromedriver-77.0.3865.75-bp150.231.1 chromium-77.0.3865.75-bp150.231.1
References
https://www.suse.com/security/cve/CVE-2019-13659.html https://www.suse.com/security/cve/CVE-2019-13660.html https://www.suse.com/security/cve/CVE-2019-13661.html https://www.suse.com/security/cve/CVE-2019-13662.html https://www.suse.com/security/cve/CVE-2019-13663.html https://www.suse.com/security/cve/CVE-2019-13664.html https://www.suse.com/security/cve/CVE-2019-13665.html https://www.suse.com/security/cve/CVE-2019-13666.html https://www.suse.com/security/cve/CVE-2019-13667.html https://www.suse.com/security/cve/CVE-2019-13668.html https://www.suse.com/security/cve/CVE-2019-13669.html https://www.suse.com/security/cve/CVE-2019-13670.html https://www.suse.com/security/cve/CVE-2019-13671.html https://www.suse.com/security/cve/CVE-2019-13673.html https://www.suse.com/security/cve/CVE-2019-13674.html https://www.suse.com/security/cve/CVE-2019-13675.html https://www.suse.com/security/cve/CVE-2019-13676.html https://www.suse.com/security/cve/CVE-2019-13677.html https://www.suse.com/security/cve/CVE-2019-13678.html https://www.suse.com/security/cve/CVE-2019-13679.html https://www.suse.com/security/cve/CVE-2019-13680.html https://www.suse.com/security/cve/CVE-2019-13681.html https://www.suse.com/security/cve/CVE-2019-13682.html https://www.suse.com/security/cve/CVE-2019-13683.html https://www.suse.com/security/cve/CVE-2019-5870.html https://www.suse.com/security/cve/CVE-2019-5871.html https://www.suse.com/security/cve/CVE-2019-5872.html https://www.suse.com/security/cve/CVE-2019-5874.html https://www.suse.com/security/cve/CVE-2019-5875.html https://www.suse.com/security/cve/CVE-2019-5876.html https://www.suse.com/security/cve/CVE-2019-5877.html https://www.suse.com/security/cve/CVE-2019-5878.html https://www.suse.com/security/cve/CVE-2019-5879.html https://www.suse.com/security/cve/CVE-2019-5880.html https://www.suse.com/security/cve/CVE-2019-5881.html https://bugzilla.suse.com/1150425--