openSUSE Security Update : Chromium (openSUSE-2016-652)

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

Chromium was updated to 51.0.2704.63 to fix the following
vulnerabilities (boo#981886) :

- CVE-2016-1672: Cross-origin bypass in extension bindings

- CVE-2016-1673: Cross-origin bypass in Blink

- CVE-2016-1674: Cross-origin bypass in extensions

- CVE-2016-1675: Cross-origin bypass in Blink

- CVE-2016-1676: Cross-origin bypass in extension bindings

- CVE-2016-1677: Type confusion in V8

- CVE-2016-1678: Heap overflow in V8

- CVE-2016-1679: Heap use-after-free in V8 bindings

- CVE-2016-1680: Heap use-after-free in Skia

- CVE-2016-1681: Heap overflow in PDFium

- CVE-2016-1682: CSP bypass for ServiceWorker

- CVE-2016-1683: Out-of-bounds access in libxslt

- CVE-2016-1684: Integer overflow in libxslt

- CVE-2016-1685: Out-of-bounds read in PDFium

- CVE-2016-1686: Out-of-bounds read in PDFium

- CVE-2016-1687: Information leak in extensions

- CVE-2016-1688: Out-of-bounds read in V8

- CVE-2016-1689: Heap buffer overflow in media

- CVE-2016-1690: Heap use-after-free in Autofill

- CVE-2016-1691: Heap buffer-overflow in Skia

- CVE-2016-1692: Limited cross-origin bypass in

- CVE-2016-1693: HTTP Download of Software Removal Tool

- CVE-2016-1694: HPKP pins removed on cache clearance

- CVE-2016-1695: Various fixes from internal audits,
fuzzing and other initiatives

See also :

Solution :

Update the affected Chromium packages.

Risk factor :

Medium / CVSS Base Score : 6.8