openSUSE Security Update : Chromium (openSUSE-2016-2597)

Medium Nessus Plugin ID 94246


The remote openSUSE host is missing a security update.


Chromium was updated to 54.0.2840.59 to fix security issues and bugs.

The following security issues are fixed (bnc#1004465) :

- CVE-2016-5181: Universal XSS in Blink

- CVE-2016-5182: Heap overflow in Blink

- CVE-2016-5183: Use after free in PDFium

- CVE-2016-5184: Use after free in PDFium

- CVE-2016-5185: Use after free in Blink

- CVE-2016-5187: URL spoofing

- CVE-2016-5188: UI spoofing

- CVE-2016-5192: Cross-origin bypass in Blink

- CVE-2016-5189: URL spoofing

- CVE-2016-5186: Out of bounds read in DevTools

- CVE-2016-5191: Universal XSS in Bookmarks

- CVE-2016-5190: Use after free in Internals

- CVE-2016-5193: Scheme bypass

The following bugs were fixed :

- bnc#1000019: display issues in full screen mode, add
--ui-disable-partial-swap to the launcher

The following packaging changes are included :

- The desktop sub-packages are no obsolete

- The package now uses the system variants of some bundled libraries

- The hangouts extension is now built


Update the affected Chromium packages.

See Also

Plugin Details

Severity: Medium

ID: 94246

File Name: openSUSE-2016-2597.nasl

Version: $Revision: 1.5 $

Type: local

Agent: unix

Published: 2016/10/25

Modified: 2016/12/27

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P


Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo, p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo, cpe:/o:novell:opensuse:13.2, cpe:/o:novell:opensuse:42.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2016/10/19

Reference Information

CVE: CVE-2016-5181, CVE-2016-5182, CVE-2016-5183, CVE-2016-5184, CVE-2016-5185, CVE-2016-5186, CVE-2016-5187, CVE-2016-5188, CVE-2016-5189, CVE-2016-5190, CVE-2016-5191, CVE-2016-5192, CVE-2016-5193