openSUSE Security Update : Chromium (openSUSE-2016-330)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

Chromium was updated to 49.0.2623.75 to fix the following security
issues: (boo#969333)

- CVE-2016-1630: Same-origin bypass in Blink

- CVE-2016-1631: Same-origin bypass in Pepper Plugin

- CVE-2016-1632: Bad cast in Extensions

- CVE-2016-1633: Use-after-free in Blink

- CVE-2016-1634: Use-after-free in Blink

- CVE-2016-1635: Use-after-free in Blink

- CVE-2016-1636: SRI Validation Bypass

- CVE-2015-8126: Out-of-bounds access in libpng

- CVE-2016-1637: Information Leak in Skia

- CVE-2016-1638: WebAPI Bypass

- CVE-2016-1639: Use-after-free in WebRTC

- CVE-2016-1640: Origin confusion in Extensions UI

- CVE-2016-1641: Use-after-free in Favicon

- CVE-2016-1642: Various fixes from internal audits,
fuzzing and other initiatives

- Multiple vulnerabilities in V8 fixed at the tip of the
4.9 branch (currently 4.9.385.26)

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=969333

Solution :

Update the affected Chromium packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now