openSUSE Security Update : chromium (openSUSE-2020-1021)

critical Nessus Plugin ID 138788

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for chromium fixes the following issues :

- Update to 84.0.4147.89 boo#1174189 :

- Critical CVE-2020-6510: Heap buffer overflow in background fetch.

- High CVE-2020-6511: Side-channel information leakage in content security policy.

- High CVE-2020-6512: Type Confusion in V8.

- High CVE-2020-6513: Heap buffer overflow in PDFium.

- High CVE-2020-6514: Inappropriate implementation in WebRTC.

- High CVE-2020-6515: Use after free in tab strip.

- High CVE-2020-6516: Policy bypass in CORS.

- High CVE-2020-6517: Heap buffer overflow in history.

- Medium CVE-2020-6518: Use after free in developer tools.

- Medium CVE-2020-6519: Policy bypass in CSP.

- Medium CVE-2020-6520: Heap buffer overflow in Skia.

- Medium CVE-2020-6521: Side-channel information leakage in autofill.

- Medium CVE-2020-6522: Inappropriate implementation in external protocol handlers.

- Medium CVE-2020-6523: Out of bounds write in Skia.

- Medium CVE-2020-6524: Heap buffer overflow in WebAudio.

- Medium CVE-2020-6525: Heap buffer overflow in Skia.

- Low CVE-2020-6526: Inappropriate implementation in iframe sandbox.

- Low CVE-2020-6527: Insufficient policy enforcement in CSP.

- Low CVE-2020-6528: Incorrect security UI in basic auth.

- Low CVE-2020-6529: Inappropriate implementation in WebRTC.

- Low CVE-2020-6530: Out of bounds memory access in developer tools.

- Low CVE-2020-6531: Side-channel information leakage in scroll to text.

- Low CVE-2020-6533: Type Confusion in V8.

- Low CVE-2020-6534: Heap buffer overflow in WebRTC.

- Low CVE-2020-6535: Insufficient data validation in WebUI.

- Low CVE-2020-6536: Incorrect security UI in PWAs.

- Use bundled xcb-proto as we need to generate py2 bindings

- Try to fix non-wayland build for Leap builds

Solution

Update the affected chromium packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1174189

Plugin Details

Severity: Critical

ID: 138788

File Name: openSUSE-2020-1021.nasl

Version: 1.5

Type: local

Agent: unix

Published: 7/21/2020

Updated: 5/13/2022

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:POC/RL:OF/RC:C

CVSS Score Source: CVE-2020-6524

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, cpe:/o:novell:opensuse:15.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/20/2020

Vulnerability Publication Date: 7/22/2020

Reference Information

CVE: CVE-2020-6510, CVE-2020-6511, CVE-2020-6512, CVE-2020-6513, CVE-2020-6514, CVE-2020-6515, CVE-2020-6516, CVE-2020-6517, CVE-2020-6518, CVE-2020-6519, CVE-2020-6520, CVE-2020-6521, CVE-2020-6522, CVE-2020-6523, CVE-2020-6524, CVE-2020-6525, CVE-2020-6526, CVE-2020-6527, CVE-2020-6528, CVE-2020-6529, CVE-2020-6530, CVE-2020-6531, CVE-2020-6533, CVE-2020-6534, CVE-2020-6535, CVE-2020-6536