openSUSE Security Update : chromium (openSUSE-SU-2013:1861-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

Chromium was updated to 31.0.1650.57: Stable channel update :

- Security Fixes :

- CVE-2013-6632: Multiple memory corruption issues.

- Update to Chromium 31.0.1650.48 Stable Channel update :

- Security fixes :

- CVE-2013-6621: Use after free related to speech input
elements..

- CVE-2013-6622: Use after free related to media elements.

- CVE-2013-6623: Out of bounds read in SVG.

- CVE-2013-6624: Use after free related to
“id” attribute strings.

- CVE-2013-6625: Use after free in DOM ranges.

- CVE-2013-6626: Address bar spoofing related to
interstitial warnings.

- CVE-2013-6627: Out of bounds read in HTTP parsing.

- CVE-2013-6628: Issue with certificates not being checked
during TLS renegotiation.

- CVE-2013-2931: Various fixes from internal audits,
fuzzing and other initiatives.

- CVE-2013-6629: Read of uninitialized memory in libjpeg
and libjpeg-turbo.

- CVE-2013-6630: Read of uninitialized memory in
libjpeg-turbo.

- CVE-2013-6631: Use after free in libjingle.

- Added patch chromium-fix-chromedriver-build.diff to fix
the chromedriver build

- Enable ARM build for Chromium.

- Added patches chromium-arm-webrtc-fix.patch,
chromium-fix-arm-icu.patch and
chromium-fix-arm-sysroot.patch to resolve ARM specific
build issues

- Update to Chromium 30.0.1599.114 Stable Channel update:
fix build for 32bit systems

- Drop patch chromium-fix-chromedriver-build.diff. This is
now fixed upstream

- For openSUSE versions lower than 13.1, build against the
in-tree libicu

- Update to Chromium 30.0.1599.101

- Security Fixes :

+ CVE-2013-2925: Use after free in XHR

+ CVE-2013-2926: Use after free in editing

+ CVE-2013-2927: Use after free in forms.

+ CVE-2013-2928: Various fixes from internal audits,
fuzzing and other initiatives.

- Update to Chromium 30.0.1599.66

- Easier searching by image

- A number of new apps/extension APIs

- Lots of under the hood changes for stability and
performance

- Security fixes :

+ CVE-2013-2906: Races in Web Audio

+ CVE-2013-2907: Out of bounds read in Window.prototype
object

+ CVE-2013-2908: Address bar spoofing related to the
“204 No Content” status code

+ CVE-2013-2909: Use after free in inline-block rendering

+ CVE-2013-2910: Use-after-free in Web Audio

+ CVE-2013-2911: Use-after-free in XSLT

+ CVE-2013-2912: Use-after-free in PPAPI

+ CVE-2013-2913: Use-after-free in XML document parsing

+ CVE-2013-2914: Use after free in the Windows color
chooser dialog

+ CVE-2013-2915: Address bar spoofing via a malformed
scheme

+ CVE-2013-2916: Address bar spoofing related to the
“204 No Content” status code

+ CVE-2013-2917: Out of bounds read in Web Audio

+ CVE-2013-2918: Use-after-free in DOM

+ CVE-2013-2919: Memory corruption in V8

+ CVE-2013-2920: Out of bounds read in URL parsing

+ CVE-2013-2921: Use-after-free in resource loader

+ CVE-2013-2922: Use-after-free in template element

+ CVE-2013-2923: Various fixes from internal audits,
fuzzing and other initiatives

+ CVE-2013-2924: Use-after-free in ICU. Upstream bug

See also :

http://lists.opensuse.org/opensuse-updates/2013-12/msg00049.html

Solution :

Update the affected chromium packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false