openSUSE Security Update : Chromium (openSUSE-2016-682)

Medium Nessus Plugin ID 91485


The remote openSUSE host is missing a security update.


Chromium was updated to 51.0.2704.79 to fix the following vulnerabilities :

- CVE-2016-1696: Cross-origin bypass in Extension bindings

- CVE-2016-1697: Cross-origin bypass in Blink

- CVE-2016-1698: Information leak in Extension bindings

- CVE-2016-1699: Parameter sanitization failure in DevTools

- CVE-2016-1700: Use-after-free in Extensions

- CVE-2016-1701: Use-after-free in Autofill

- CVE-2016-1702: Out-of-bounds read in Skia

- CVE-2016-1703: Various fixes from internal audits, fuzzing and other initiatives Also includes vulnerabilities fixed in 51.0.2704.63 (boo#981886) :

- CVE-2016-1672: Cross-origin bypass in extension bindings

- CVE-2016-1673: Cross-origin bypass in Blink

- CVE-2016-1674: Cross-origin bypass in extensions

- CVE-2016-1675: Cross-origin bypass in Blink

- CVE-2016-1676: Cross-origin bypass in extension bindings

- CVE-2016-1677: Type confusion in V8

- CVE-2016-1678: Heap overflow in V8

- CVE-2016-1679: Heap use-after-free in V8 bindings

- CVE-2016-1680: Heap use-after-free in Skia

- CVE-2016-1681: Heap overflow in PDFium

- CVE-2016-1682: CSP bypass for ServiceWorker

- CVE-2016-1683: Out-of-bounds access in libxslt

- CVE-2016-1684: Integer overflow in libxslt

- CVE-2016-1685: Out-of-bounds read in PDFium

- CVE-2016-1686: Out-of-bounds read in PDFium

- CVE-2016-1687: Information leak in extensions

- CVE-2016-1688: Out-of-bounds read in V8

- CVE-2016-1689: Heap buffer overflow in media

- CVE-2016-1690: Heap use-after-free in Autofill

- CVE-2016-1691: Heap buffer-overflow in Skia

- CVE-2016-1692: Limited cross-origin bypass in ServiceWorker

- CVE-2016-1693: HTTP Download of Software Removal Tool

- CVE-2016-1694: HPKP pins removed on cache clearance

- CVE-2016-1695: Various fixes from internal audits, fuzzing and other initiatives


Update the affected Chromium packages.

See Also

Plugin Details

Severity: Medium

ID: 91485

File Name: openSUSE-2016-682.nasl

Version: $Revision: 2.6 $

Type: local

Agent: unix

Published: 2016/06/06

Modified: 2016/10/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P


Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, p-cpe:/a:novell:opensuse:chromium-desktop-gnome, p-cpe:/a:novell:opensuse:chromium-desktop-kde, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2016/06/05

Reference Information

CVE: CVE-2016-1672, CVE-2016-1673, CVE-2016-1674, CVE-2016-1675, CVE-2016-1676, CVE-2016-1677, CVE-2016-1678, CVE-2016-1679, CVE-2016-1680, CVE-2016-1681, CVE-2016-1682, CVE-2016-1683, CVE-2016-1684, CVE-2016-1685, CVE-2016-1686, CVE-2016-1687, CVE-2016-1688, CVE-2016-1689, CVE-2016-1690, CVE-2016-1691, CVE-2016-1692, CVE-2016-1693, CVE-2016-1694, CVE-2016-1695, CVE-2016-1696, CVE-2016-1697, CVE-2016-1698, CVE-2016-1699, CVE-2016-1700, CVE-2016-1701, CVE-2016-1702, CVE-2016-1703