openSUSE: 2019:2692-1: important: chromium
Description
This update for chromium fixes the following issues: Chromium was updated to 79.0.3945.79 (boo#1158982) - CVE-2019-13725: Fixed a use after free in Bluetooth - CVE-2019-13726: Fixed a heap buffer overflow in password manager - CVE-2019-13727: Fixed an insufficient policy enforcement in WebSockets - CVE-2019-13728: Fixed an out of bounds write in V8 - CVE-2019-13729: Fixed a use after free in WebSockets - CVE-2019-13730: Fixed a type Confusion in V8 - CVE-2019-13732: Fixed a use after free in WebAudio - CVE-2019-13734: Fixed an out of bounds write in SQLite - CVE-2019-13735: Fixed an out of bounds write in V8 - CVE-2019-13764: Fixed a type Confusion in V8 - CVE-2019-13736: Fixed an integer overflow in PDFium - CVE-2019-13737: Fixed an insufficient policy enforcement in autocomplete - CVE-2019-13738: Fixed an insufficient policy enforcement in navigation - CVE-2019-13739: Fixed an incorrect security UI in Omnibox - CVE-...
Read the Full Advisory
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2019-2692=1
Package List
- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 x86_64): chromedriver-79.0.3945.79-19.1 chromedriver-debuginfo-79.0.3945.79-19.1 chromium-79.0.3945.79-19.1 chromium-debuginfo-79.0.3945.79-19.1 chromium-debugsource-79.0.3945.79-19.1
References
https://www.suse.com/security/cve/CVE-2019-13725.html https://www.suse.com/security/cve/CVE-2019-13726.html https://www.suse.com/security/cve/CVE-2019-13727.html https://www.suse.com/security/cve/CVE-2019-13728.html https://www.suse.com/security/cve/CVE-2019-13729.html https://www.suse.com/security/cve/CVE-2019-13730.html https://www.suse.com/security/cve/CVE-2019-13732.html https://www.suse.com/security/cve/CVE-2019-13734.html https://www.suse.com/security/cve/CVE-2019-13735.html https://www.suse.com/security/cve/CVE-2019-13736.html https://www.suse.com/security/cve/CVE-2019-13737.html https://www.suse.com/security/cve/CVE-2019-13738.html https://www.suse.com/security/cve/CVE-2019-13739.html https://www.suse.com/security/cve/CVE-2019-13740.html https://www.suse.com/security/cve/CVE-2019-13741.html https://www.suse.com/security/cve/CVE-2019-13742.html https://www.suse.com/security/cve/CVE-2019-13743.html https://www.suse.com/security/cve/CVE-2019-13744.html https://www.suse.com/security/cve/CVE-2019-13745.html https://www.suse.com/security/cve/CVE-2019-13746.html https://www.suse.com/security/cve/CVE-2019-13747.html https://www.suse.com/security/cve/CVE-2019-13748.html https://www.suse.com/security/cve/CVE-2019-13749.html https://www.suse.com/security/cve/CVE-2019-13750.html https://www.suse.com/security/cve/CVE-2019-13751.html https://www.suse.com/security/cve/CVE-2019-13752.html https://www.suse.com/security/cve/CVE-2019-13753.html https://www.suse.com/security/cve/CVE-2019-13754.html https://www.suse.com/security/cve/CVE-2019-13755.html https://www.suse.com/security/cve/CVE-2019-13756.html https://www.suse.com/security/cve/CVE-2019-13757.html https://www.suse.com/security/cve/CVE-2019-13758.html https://www.suse.com/security/cve/CVE-2019-13759.html https://www.suse.com/security/cve/CVE-2019-13761.html https://www.suse.com/security/cve/CVE-2019-13762.html https://www.suse.com/security/cve/CVE-2019-13763.html https://www.suse.com/security/cve/CVE-2019-13764.html https://bugzilla.suse.com/1158982--