openSUSE Security Update : Chromium (openSUSE-2018-264)

Critical Nessus Plugin ID 108436

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.7


The remote openSUSE host is missing a security update.


This update for Chromium to version 65.0.3325.162 fixes the following issues :

- CVE-2017-11215: Use after free in Flash

- CVE-2017-11225: Use after free in Flash

- CVE-2018-6060: Use after free in Blink

- CVE-2018-6061: Race condition in V8

- CVE-2018-6062: Heap buffer overflow in Skia

- CVE-2018-6057: Incorrect permissions on shared memory

- CVE-2018-6063: Incorrect permissions on shared memory

- CVE-2018-6064: Type confusion in V8

- CVE-2018-6065: Integer overflow in V8

- CVE-2018-6066: Same Origin Bypass via canvas

- CVE-2018-6067: Buffer overflow in Skia

- CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab

- CVE-2018-6069: Stack-based buffer overflow in Skia

- CVE-2018-6070: CSP bypass through extensions

- CVE-2018-6071: Heap bufffer overflow in Skia

- CVE-2018-6072: Integer overflow in PDFium

- CVE-2018-6073: Heap bufffer overflow in WebGL

- CVE-2018-6074: Mark-of-the-Web bypass

- CVE-2018-6075: Overly permissive cross origin downloads

- CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink

- CVE-2018-6077: Timing attack using SVG filters

- CVE-2018-6078: URL Spoof in OmniBox

- CVE-2018-6079: Information disclosure via texture data in WebGL

- CVE-2018-6080: Information disclosure in IPC call

- CVE-2018-6081: XSS in interstitials

- CVE-2018-6082: Circumvention of port blocking

- CVE-2018-6083: Incorrect processing of AppManifests


Update the affected Chromium packages.

See Also

Plugin Details

Severity: Critical

ID: 108436

File Name: openSUSE-2018-264.nasl

Version: 1.6

Type: local

Agent: unix

Published: 2018/03/19

Updated: 2021/01/19

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 6.7

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2018/03/16

Reference Information

CVE: CVE-2017-11215, CVE-2017-11225, CVE-2018-6057, CVE-2018-6060, CVE-2018-6061, CVE-2018-6062, CVE-2018-6063, CVE-2018-6064, CVE-2018-6065, CVE-2018-6066, CVE-2018-6067, CVE-2018-6068, CVE-2018-6069, CVE-2018-6070, CVE-2018-6071, CVE-2018-6072, CVE-2018-6073, CVE-2018-6074, CVE-2018-6075, CVE-2018-6076, CVE-2018-6077, CVE-2018-6078, CVE-2018-6079, CVE-2018-6080, CVE-2018-6081, CVE-2018-6082, CVE-2018-6083