openSUSE Security Update : Chromium (openSUSE-2016-221)

high Nessus Plugin ID 88826


The remote openSUSE host is missing a security update.


This update to Chromium 48.0.2564.109 fixes the following issues :

Security fixes (boo#965999) :

- CVE-2016-1622: Same-origin bypass in Extensions

- CVE-2016-1623: Same-origin bypass in DOM

- CVE-2016-1624: Buffer overflow in Brotli

- CVE-2016-1625: Navigation bypass in Chrome Instant

- CVE-2016-1626: Out-of-bounds read in PDFium

- CVE-2016-1627: Various fixes from internal audits, fuzzing and other initiatives

Non-security bug fixes :

- boo#965738: resolve issues with specific banking websites when built against system libraries

- boo#966082: chromium: sandbox related stacktrace printed

- boo#965566: Drop libva support

- Prevent graphical issues related to libjpeg

- On KDE 5 kwallet5 is the default password store now


Update the affected Chromium packages.

See Also

Plugin Details

Severity: High

ID: 88826

File Name: openSUSE-2016-221.nasl

Version: 2.9

Type: local

Agent: unix

Published: 2/18/2016

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Medium

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P


Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, p-cpe:/a:novell:opensuse:chromium-desktop-gnome, p-cpe:/a:novell:opensuse:chromium-desktop-kde, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo, cpe:/o:novell:opensuse:13.2, cpe:/o:novell:opensuse:42.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2/17/2016

Reference Information

CVE: CVE-2016-1622, CVE-2016-1623, CVE-2016-1624, CVE-2016-1625, CVE-2016-1626, CVE-2016-1627