openSUSE Security Update : Chromium (openSUSE-2016-109)

high Nessus Plugin ID 88539


The remote openSUSE host is missing a security update.


Chromium was updated to 48.0.2564.82 to fix security issues and bugs.

The following vulnerabilities were fixed :

- CVE-2016-1612: Bad cast in V8 (boo#963184)

- CVE-2016-1613: Use-after-free in PDFium (boo#963185)

- CVE-2016-1614: Information leak in Blink (boo#963186)

- CVE-2016-1615: Origin confusion in Omnibox (boo#963187)

- CVE-2016-1616: URL Spoofing (boo#963188)

- CVE-2016-1617: History sniffing with HSTS and CSP (boo#963189)

- CVE-2016-1618: Weak random number generator in Blink (boo#963190)

- CVE-2016-1619: Out-of-bounds read in PDFium (boo#963191)

- CVE-2016-1620 chromium-browser: various fixes (boo#963192)

This update also enables SSE2 support on x86_64, VA-API hardware acceleration and fixes a crash when trying to enable the Chromecast extension.


Update the affected Chromium packages.

See Also

Plugin Details

Severity: High

ID: 88539

File Name: openSUSE-2016-109.nasl

Version: 2.7

Type: local

Agent: unix

Published: 2/3/2016

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C


Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, p-cpe:/a:novell:opensuse:chromium-desktop-gnome, p-cpe:/a:novell:opensuse:chromium-desktop-kde, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 1/27/2016

Reference Information

CVE: CVE-2016-1612, CVE-2016-1613, CVE-2016-1614, CVE-2016-1615, CVE-2016-1616, CVE-2016-1617, CVE-2016-1618, CVE-2016-1619, CVE-2016-1620