openSUSE Security Update : chromium (openSUSE-SU-2013:1776-1)

Critical Nessus Plugin ID 75212

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.3

Synopsis

The remote openSUSE host is missing a security update.

Description

Security and bugfix update to Chromium 31.0.1650.57

- Update to Chromium 31.0.1650.57 :

- Security Fixes :

- CVE-2013-6632: Multiple memory corruption issues.

- Update to Chromium 31.0.1650.48 Stable Channel update :

- Security fixes :

- CVE-2013-6621: Use after free related to speech input elements..

- CVE-2013-6622: Use after free related to media elements.

- CVE-2013-6623: Out of bounds read in SVG.

- CVE-2013-6624: Use after free related to “id” attribute strings.

- CVE-2013-6625: Use after free in DOM ranges.

- CVE-2013-6626: Address bar spoofing related to interstitial warnings.

- CVE-2013-6627: Out of bounds read in HTTP parsing.

- CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation.

- CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives.

- CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo.

- CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo.

- CVE-2013-6631: Use after free in libjingle.

- Stable Channel update: fix build for 32bit systems

- Update to Chromium 30.0.1599.101

- Security Fixes :

+ CVE-2013-2925: Use after free in XHR

+ CVE-2013-2926: Use after free in editing

+ CVE-2013-2927: Use after free in forms.

+ CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives.

- Enable ARM build for Chromium.

Solution

Update the affected chromium packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=849715

https://bugzilla.novell.com/show_bug.cgi?id=850430

https://lists.opensuse.org/opensuse-updates/2013-11/msg00107.html

Plugin Details

Severity: Critical

ID: 75212

File Name: openSUSE-2013-903.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2014/06/13

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 6.3

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, p-cpe:/a:novell:opensuse:chromium-desktop-gnome, p-cpe:/a:novell:opensuse:chromium-desktop-kde, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo, p-cpe:/a:novell:opensuse:chromium-suid-helper, p-cpe:/a:novell:opensuse:chromium-suid-helper-debuginfo, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/11/20

Reference Information

CVE: CVE-2013-2925, CVE-2013-2926, CVE-2013-2927, CVE-2013-2928, CVE-2013-2931, CVE-2013-6621, CVE-2013-6622, CVE-2013-6623, CVE-2013-6624, CVE-2013-6625, CVE-2013-6626, CVE-2013-6627, CVE-2013-6628, CVE-2013-6629, CVE-2013-6630, CVE-2013-6631, CVE-2013-6632

BID: 63024, 63025, 63026, 63028, 63667, 63669, 63670, 63671, 63672, 63673, 63674, 63675, 63676, 63677, 63678, 63679, 63729