openSUSE Security Update : Chromium (openSUSE-2018-1253)

High Nessus Plugin ID 118386

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for Chromium to version 70.0.3538.67 fixes multiple issues.

Security issues fixed (bsc#1112111) :

- CVE-2018-17462: Sandbox escape in AppCache

- CVE-2018-17463: Remote code execution in V8

- Heap buffer overflow in Little CMS in PDFium

- CVE-2018-17464: URL spoof in Omnibox

- CVE-2018-17465: Use after free in V8

- CVE-2018-17466: Memory corruption in Angle

- CVE-2018-17467: URL spoof in Omnibox

- CVE-2018-17468: Cross-origin URL disclosure in Blink

- CVE-2018-17469: Heap buffer overflow in PDFium

- CVE-2018-17470: Memory corruption in GPU Internals

- CVE-2018-17471: Security UI occlusion in full screen mode

- CVE-2018-17473: URL spoof in Omnibox

- CVE-2018-17474: Use after free in Blink

- CVE-2018-17475: URL spoof in Omnibox

- CVE-2018-17476: Security UI occlusion in full screen mode

- CVE-2018-5179: Lack of limits on update() in ServiceWorker

- CVE-2018-17477: UI spoof in Extensions

VAAPI hardware accelerated rendering is now enabled by default. This update contains the following packaging changes :

- Use the system libusb-1.0 library

- Use bundled harfbuzz library

- Disable gnome-keyring to avoid crashes

Solution

Update the affected Chromium packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1112111

Plugin Details

Severity: High

ID: 118386

File Name: openSUSE-2018-1253.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2018/10/25

Modified: 2018/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2018/10/24

Reference Information

CVE: CVE-2018-17462, CVE-2018-17463, CVE-2018-17464, CVE-2018-17465, CVE-2018-17466, CVE-2018-17467, CVE-2018-17468, CVE-2018-17469, CVE-2018-17470, CVE-2018-17471, CVE-2018-17472, CVE-2018-17473, CVE-2018-17474, CVE-2018-17475, CVE-2018-17476, CVE-2018-17477, CVE-2018-5179