openSUSE Security Update : chromium (openSUSE-2020-823)

high Nessus Plugin ID 138688


New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote openSUSE host is missing a security update.


This update for chromium fixes the following issues :

Chromium was updated to 83.0.4103.97 (boo#1171910,bsc#1172496) :

- CVE-2020-6463: Use after free in ANGLE (boo#1170107 boo#1171975).

- CVE-2020-6465: Use after free in reader mode. Reported by Woojin Oh(@pwn_expoit) of STEALIEN on 2020-04-21

- CVE-2020-6466: Use after free in media. Reported by Zhe Jin from cdsrc of Qihoo 360 on 2020-04-26

- CVE-2020-6467: Use after free in WebRTC. Reported by ZhanJia Song on 2020-04-06

- CVE-2020-6468: Type Confusion in V8. Reported by Chris Salls and Jake Corina of Seaside Security, Chani Jindal of Shellphish on 2020-04-30

- CVE-2020-6469: Insufficient policy enforcement in developer tools. Reported by David Erceg on 2020-04-02

- CVE-2020-6470: Insufficient validation of untrusted input in clipboard. Reported by Michał Bentkowski of Securitum on 2020-03-30

- CVE-2020-6471: Insufficient policy enforcement in developer tools. Reported by David Erceg on 2020-03-08

- CVE-2020-6472: Insufficient policy enforcement in developer tools. Reported by David Erceg on 2020-03-25

- CVE-2020-6473: Insufficient policy enforcement in Blink.
Reported by Soroush Karami and Panagiotis Ilia on 2020-02-06

- CVE-2020-6474: Use after free in Blink. Reported by Zhe Jin from cdsrc of Qihoo 360 on 2020-03-07

- CVE-2020-6475: Incorrect security UI in full screen.
Reported by Khalil Zhani on 2019-10-31

- CVE-2020-6476: Insufficient policy enforcement in tab strip. Reported by Alexandre Le Borgne on 2019-12-18

- CVE-2020-6477: Inappropriate implementation in installer. Reported by RACK911 Labs on 2019-03-26

- CVE-2020-6478: Inappropriate implementation in full screen. Reported by Khalil Zhani on 2019-12-24

- CVE-2020-6479: Inappropriate implementation in sharing.
Reported by Zhong Zhaochen of on 2020-01-14

- CVE-2020-6480: Insufficient policy enforcement in enterprise. Reported by Marvin Witt on 2020-02-21

- CVE-2020-6481: Insufficient policy enforcement in URL formatting. Reported by Rayyan Bijoora on 2020-04-07

- CVE-2020-6482: Insufficient policy enforcement in developer tools. Reported by Abdulrahman Alqabandi (@qab) on 2017-12-17

- CVE-2020-6483: Insufficient policy enforcement in payments. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2019-05-23

- CVE-2020-6484: Insufficient data validation in ChromeDriver. Reported by Artem Zinenko on 2020-01-26

- CVE-2020-6485: Insufficient data validation in media router. Reported by Sergei Glazunov of Google Project Zero on 2020-01-30

- CVE-2020-6486: Insufficient policy enforcement in navigations. Reported by David Erceg on 2020-02-24

- CVE-2020-6487: Insufficient policy enforcement in downloads. Reported by Jun Kokatsu (@shhnjk) on 2015-10-06

- CVE-2020-6488: Insufficient policy enforcement in downloads. Reported by David Erceg on 2020-01-21

- CVE-2020-6489: Inappropriate implementation in developer tools. Reported by @lovasoa (Ophir LOJKINE) on 2020-02-10

- CVE-2020-6490: Insufficient data validation in loader.
Reported by Twitter on 2019-12-19

- CVE-2020-6491: Incorrect security UI in site information. Reported by Sultan Haikal M.A on 2020-02-07

- CVE-2020-6493: Use after free in WebAuthentication.

- CVE-2020-6494: Incorrect security UI in payments.

- CVE-2020-6495: Insufficient policy enforcement in developer tools.

- CVE-2020-6496: Use after free in payments.


Update the affected chromium packages.

See Also

Plugin Details

Severity: High

ID: 138688

File Name: openSUSE-2020-823.nasl

Version: 1.2

Type: local

Agent: unix

Published: 7/20/2020

Updated: 7/22/2020

Dependencies: ssh_get_info.nasl

Risk Information

CVSS Score Source: CVE-2020-6496


Risk Factor: High

Score: 7.3


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:novell:opensuse:15.1:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromium:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromium-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromium-debugsource:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromedriver:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:chromedriver-debuginfo:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 6/17/2020

Vulnerability Publication Date: 5/21/2020

Reference Information

CVE: CVE-2020-6465, CVE-2020-6466, CVE-2020-6467, CVE-2020-6468, CVE-2020-6469, CVE-2020-6470, CVE-2020-6471, CVE-2020-6472, CVE-2020-6473, CVE-2020-6474, CVE-2020-6475, CVE-2020-6476, CVE-2020-6477, CVE-2020-6478, CVE-2020-6479, CVE-2020-6480, CVE-2020-6481, CVE-2020-6482, CVE-2020-6483, CVE-2020-6484, CVE-2020-6485, CVE-2020-6486, CVE-2020-6487, CVE-2020-6488, CVE-2020-6489, CVE-2020-6490, CVE-2020-6491, CVE-2020-6463, CVE-2020-6495, CVE-2020-6496, CVE-2020-6493, CVE-2020-6494