openSUSE: 2020:0519-1: important: chromium
An update that fixes 26 vulnerabilities is now available.
Description
This update for chromium fixes the following issues: Chromium was updated to 81.0.4044.92 boo#1168911: * CVE-2020-6454: Use after free in extensions * CVE-2020-6423: Use after free in audio * CVE-2020-6455: Out of bounds read in WebSQL * CVE-2020-6430: Type Confusion in V8 * CVE-2020-6456: Insufficient validation of untrusted input in clipboard * CVE-2020-6431: Insufficient policy enforcement in full screen * CVE-2020-6432: Insufficient policy enforcement in navigations * CVE-2020-6433: Insufficient policy enforcement in extensions * CVE-2020-6434: Use after free in devtools * CVE-2020-6435: Insufficient policy enforcement in extensions * CVE-2020-6436: Use after free in window management * CVE-2020-6437: Inappropriate implementation in WebView * CVE-2020-6438: Insufficient policy enforcement in extensions * CVE-2020-6439: Insufficient policy enforcement in navigations * CVE-2020-6...
Read the Full Advisory
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.1: zypper in -t patch openSUSE-2020-519=1
Package List
- openSUSE Leap 15.1 (x86_64): chromedriver-81.0.4044.92-lp151.2.77.1 chromedriver-debuginfo-81.0.4044.92-lp151.2.77.1 chromium-81.0.4044.92-lp151.2.77.1 chromium-debuginfo-81.0.4044.92-lp151.2.77.1 chromium-debugsource-81.0.4044.92-lp151.2.77.1
References
https://www.suse.com/security/cve/CVE-2020-6423.html https://www.suse.com/security/cve/CVE-2020-6430.html https://www.suse.com/security/cve/CVE-2020-6431.html https://www.suse.com/security/cve/CVE-2020-6432.html https://www.suse.com/security/cve/CVE-2020-6433.html https://www.suse.com/security/cve/CVE-2020-6434.html https://www.suse.com/security/cve/CVE-2020-6435.html https://www.suse.com/security/cve/CVE-2020-6436.html https://www.suse.com/security/cve/CVE-2020-6437.html https://www.suse.com/security/cve/CVE-2020-6438.html https://www.suse.com/security/cve/CVE-2020-6439.html https://www.suse.com/security/cve/CVE-2020-6440.html https://www.suse.com/security/cve/CVE-2020-6441.html https://www.suse.com/security/cve/CVE-2020-6442.html https://www.suse.com/security/cve/CVE-2020-6443.html https://www.suse.com/security/cve/CVE-2020-6444.html https://www.suse.com/security/cve/CVE-2020-6445.html https://www.suse.com/security/cve/CVE-2020-6446.html https://www.suse.com/security/cve/CVE-2020-6447.html https://www.suse.com/security/cve/CVE-2020-6448.html https://www.suse.com/security/cve/CVE-2020-6450.html https://www.suse.com/security/cve/CVE-2020-6451.html https://www.suse.com/security/cve/CVE-2020-6452.html https://www.suse.com/security/cve/CVE-2020-6454.html https://www.suse.com/security/cve/CVE-2020-6455.html https://www.suse.com/security/cve/CVE-2020-6456.html https://bugzilla.suse.com/1167465 https://bugzilla.suse.com/1168421 https://bugzilla.suse.com/1168911 --