openSUSE Security Update : Chromium (openSUSE-2019-559)

high Nessus Plugin ID 123240

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for Chromium to version 68.0.3440.75 fixes multiple issues.

Security issues fixed (boo#1102530) :

- CVE-2018-6153: Stack-based buffer overflow in Skia

- CVE-2018-6154: Heap buffer overflow in WebGL

- CVE-2018-6155: Use after free in WebRTC

- CVE-2018-6156: Heap buffer overflow in WebRTC

- CVE-2018-6157: Type confusion in WebRTC

- CVE-2018-6158: Use after free in Blink

- CVE-2018-6159: Same origin policy bypass in ServiceWorker

- CVE-2018-6161: Same origin policy bypass in WebAudio

- CVE-2018-6162: Heap buffer overflow in WebGL

- CVE-2018-6163: URL spoof in Omnibox

- CVE-2018-6164: Same origin policy bypass in ServiceWorker

- CVE-2018-6165: URL spoof in Omnibox

- CVE-2018-6166: URL spoof in Omnibox

- CVE-2018-6167: URL spoof in Omnibox

- CVE-2018-6168: CORS bypass in Blink

- CVE-2018-6169: Permissions bypass in extension installation

- CVE-2018-6170: Type confusion in PDFium

- CVE-2018-6171: Use after free in WebBluetooth

- CVE-2018-6172: URL spoof in Omnibox

- CVE-2018-6173: URL spoof in Omnibox

- CVE-2018-6174: Integer overflow in SwiftShader

- CVE-2018-6175: URL spoof in Omnibox

- CVE-2018-6176: Local user privilege escalation in Extensions

- CVE-2018-6177: Cross origin information leak in Blink

- CVE-2018-6178: UI spoof in Extensions

- CVE-2018-6179: Local file information leak in Extensions

- CVE-2018-6044: Request privilege escalation in Extensions

- CVE-2018-4117: Cross origin information leak in Blink

The following user interface changes are included :

- Chrome will show the 'Not secure' warning on all plain HTTP pages

Solution

Update the affected Chromium packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1102530

Plugin Details

Severity: High

ID: 123240

File Name: openSUSE-2019-559.nasl

Version: 1.6

Type: local

Agent: unix

Published: 3/27/2019

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, cpe:/o:novell:opensuse:15.0

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2019

Vulnerability Publication Date: 4/3/2018

Reference Information

CVE: CVE-2018-4117, CVE-2018-6044, CVE-2018-6153, CVE-2018-6154, CVE-2018-6155, CVE-2018-6156, CVE-2018-6157, CVE-2018-6158, CVE-2018-6159, CVE-2018-6161, CVE-2018-6162, CVE-2018-6163, CVE-2018-6164, CVE-2018-6165, CVE-2018-6166, CVE-2018-6167, CVE-2018-6168, CVE-2018-6169, CVE-2018-6170, CVE-2018-6171, CVE-2018-6172, CVE-2018-6173, CVE-2018-6174, CVE-2018-6175, CVE-2018-6176, CVE-2018-6177, CVE-2018-6178, CVE-2018-6179