openSUSE Security Update : chromium (openSUSE-2021-41)

critical Nessus Plugin ID 145308

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for chromium fixes the following issues :

- Update to 87.0.4280.141 (boo#1180645)

- CVE-2021-21106: Use after free in autofill

- CVE-2021-21107: Use after free in drag and drop

- CVE-2021-21108: Use after free in media

- CVE-2021-21109: Use after free in payments

- CVE-2021-21110: Use after free in safe browsing

- CVE-2021-21111: Insufficient policy enforcement in WebUI

- CVE-2021-21112: Use after free in Blink

- CVE-2021-21113: Heap buffer overflow in Skia

- CVE-2020-16043: Insufficient data validation in networking

- CVE-2021-21114: Use after free in audio

- CVE-2020-15995: Out of bounds write in V8

- CVE-2021-21115: Use after free in safe browsing

- CVE-2021-21116: Heap buffer overflow in audio

- Use main URLs instead of redirects in master preferences

Solution

Update the affected chromium packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1180645

Plugin Details

Severity: Critical

ID: 145308

File Name: openSUSE-2021-41.nasl

Version: 1.3

Type: local

Agent: unix

Published: 1/25/2021

Updated: 1/26/2024

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.5

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-21106

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 8.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2021-21115

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, cpe:/o:novell:opensuse:15.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/10/2021

Vulnerability Publication Date: 11/3/2020

Reference Information

CVE: CVE-2020-15995, CVE-2020-16043, CVE-2021-21106, CVE-2021-21107, CVE-2021-21108, CVE-2021-21109, CVE-2021-21110, CVE-2021-21111, CVE-2021-21112, CVE-2021-21113, CVE-2021-21114, CVE-2021-21115, CVE-2021-21116