openSUSE Security Update : Chromium (openSUSE-2018-264)

critical Nessus Plugin ID 108436


New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote openSUSE host is missing a security update.


This update for Chromium to version 65.0.3325.162 fixes the following issues :

- CVE-2017-11215: Use after free in Flash

- CVE-2017-11225: Use after free in Flash

- CVE-2018-6060: Use after free in Blink

- CVE-2018-6061: Race condition in V8

- CVE-2018-6062: Heap buffer overflow in Skia

- CVE-2018-6057: Incorrect permissions on shared memory

- CVE-2018-6063: Incorrect permissions on shared memory

- CVE-2018-6064: Type confusion in V8

- CVE-2018-6065: Integer overflow in V8

- CVE-2018-6066: Same Origin Bypass via canvas

- CVE-2018-6067: Buffer overflow in Skia

- CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab

- CVE-2018-6069: Stack-based buffer overflow in Skia

- CVE-2018-6070: CSP bypass through extensions

- CVE-2018-6071: Heap bufffer overflow in Skia

- CVE-2018-6072: Integer overflow in PDFium

- CVE-2018-6073: Heap bufffer overflow in WebGL

- CVE-2018-6074: Mark-of-the-Web bypass

- CVE-2018-6075: Overly permissive cross origin downloads

- CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink

- CVE-2018-6077: Timing attack using SVG filters

- CVE-2018-6078: URL Spoof in OmniBox

- CVE-2018-6079: Information disclosure via texture data in WebGL

- CVE-2018-6080: Information disclosure in IPC call

- CVE-2018-6081: XSS in interstitials

- CVE-2018-6082: Circumvention of port blocking

- CVE-2018-6083: Incorrect processing of AppManifests


Update the affected Chromium packages.

See Also

Plugin Details

Severity: Critical

ID: 108436

File Name: openSUSE-2018-264.nasl

Version: 1.6

Type: local

Agent: unix

Published: 3/19/2018

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: High

Score: 8.9


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:novell:opensuse:42.3:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromium:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromium-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromium-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromedriver:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromedriver-debuginfo:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/16/2018

Reference Information

CVE: CVE-2017-11215, CVE-2017-11225, CVE-2018-6057, CVE-2018-6060, CVE-2018-6061, CVE-2018-6062, CVE-2018-6063, CVE-2018-6064, CVE-2018-6065, CVE-2018-6066, CVE-2018-6067, CVE-2018-6069, CVE-2018-6070, CVE-2018-6071, CVE-2018-6072, CVE-2018-6073, CVE-2018-6074, CVE-2018-6075, CVE-2018-6076, CVE-2018-6077, CVE-2018-6078, CVE-2018-6079, CVE-2018-6080, CVE-2018-6081, CVE-2018-6082, CVE-2018-6083, CVE-2018-6068