openSUSE Security Update : Chromium (openSUSE-2016-756)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

Chromium was updated to 51.0.2704.103 to fix three vulnerabilities :

- CVE-2016-1704: Various fixes from internal audits,
fuzzing and other initiatives (shared identifier)
(boo#985397)

Includes vulnerability fixes from 50.0.2661.102 (boo#979859) :

- CVE-2016-1667: Same origin bypass in DOM

- CVE-2016-1668: Same origin bypass in Blink V8 bindings

- CVE-2016-1669: Buffer overflow in V8

- CVE-2016-1670: Race condition in loader

Includes vulnerability fixes from 50.0.2661.94 (boo#977830) :

- CVE-2016-1660: Out-of-bounds write in Blink

- CVE-2016-1661: Memory corruption in cross-process frames

- CVE-2016-1662: Use-after-free in extensions

- CVE-2016-1663: Use-after-free in Blink’s V8
bindings

- CVE-2016-1664: Address bar spoofing

- CVE-2016-1665: Information leak in V8

- CVE-2016-1666: Various fixes from internal audits,
fuzzing and other initiatives

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=977830
https://bugzilla.opensuse.org/show_bug.cgi?id=979859
https://bugzilla.opensuse.org/show_bug.cgi?id=985397

Solution :

Update the affected Chromium packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now