openSUSE Security Update: chromium for Chromium and V8 to 18.0.1025.142
__________________________________________________ ____________________________

Announcement ID: openSUSE-SU-2012:0492-1
Rating: moderate
References:
Affected Products:
openSUSE 12.1
__________________________________________________ ____________________________

An update that contains security fixes can now be installed.

Description:

Security update for Chromium and V8 to 18.0.1025.142.

Following bugs are listed in the Chrome changelog:
- [$500]
[109574<https://code.google.com/p/chromium/issues/detail?id=
109574>] Medium CVE-2011-3058: Bad interaction possibly
leading to XSS in EUC-JP. Credit to Masato Kinugawa.
- [$500]
[112317<https://code.google.com/p/chromium/issues/detail?id=
112317>] Medium CVE-2011-3059: Out-of-bounds read in SVG
text handling. Credit to Arthur Gerkis.
- [$500]
[114056<https://code.google.com/p/chromium/issues/detail?id=
114056>] Medium CVE-2011-3060: Out-of-bounds read in text
fragment handling. Credit to miaubiz.
- [116398
<https://code.google.com/p/chromium/issues/detail?id=116398>
] Medium CVE-2011-3061: SPDY proxy certificate checking
error. Credit to Leonidas Kontothanassis of Google.
- [116524
<https://code.google.com/p/chromium/issues/detail?id=116524>
] High CVE-2011-3062: Off-by-one in OpenType Sanitizer.
Credit to Mateusz Jurczyk of the Google Security Team.
- [117417
<https://code.google.com/p/chromium/issues/detail?id=117417>
] Low CVE-2011-3063: Validate navigation requests from the
renderer more carefully. Credit to kuzzcc, Sergey Glazunov,
PinkiePie and scarybeasts (Google Chrome Security Team).
- [$1000]
[117471<https://code.google.com/p/chromium/issues/detail?id=
117471>] High CVE-2011-3064: Use-after-free in SVG
clipping. Credit to Atte Kettunen of OUSPG.
- [$1000]
[117588<https://code.google.com/p/chromium/issues/detail?id=
117588>] High CVE-2011-3065: Memory corruption in Skia.
Credit to Omair.
- [$500]
[117794<https://code.google.com/p/chromium/issues/detail?id=
117794>] Medium CVE-2011-3057: Invalid read in v8. Credit
to Christian Holler.


The bugs
[112317<https://code.google.com/p/chromium/issues/detail?id=
112317>], [114056
<https://code.google.com/p/chromium/issues/detail?id=114056>
] and [ 117471
<https://code.google.com/p/chromium/issues/detail?id=117471>
] were detected using
AddressSanitizer<http://code.google.com/p/address-sanitizer/
wiki/AddressSanitizer> .

We'd also like to thank miaubiz, Chamal de Silva, Atte
Kettunen of OUSPG, Aki Helin of OUSPG and Arthur Gerkis for
working with us during the development cycle and preventing
security regressions from ever reaching the stable channel.
$8000 of additional rewards were issued for this awesomeness


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.1:

zypper in -t patch openSUSE-2012-215

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.1 (i586 x86_64):

chromium-20.0.1094.0-1.17.2
chromium-debuginfo-20.0.1094.0-1.17.2
chromium-debugsource-20.0.1094.0-1.17.2
chromium-desktop-gnome-20.0.1094.0-1.17.2
chromium-desktop-kde-20.0.1094.0-1.17.2
chromium-suid-helper-20.0.1094.0-1.17.2
chromium-suid-helper-debuginfo-20.0.1094.0-1.17.2
libv8-3-3.10.0.5-1.21.1
libv8-3-debuginfo-3.10.0.5-1.21.1
v8-debugsource-3.10.0.5-1.21.1
v8-devel-3.10.0.5-1.21.1
v8-private-headers-devel-3.10.0.5-1.21.1


References: