openSUSE Security Update : Chromium (openSUSE-2017-353)

Medium Nessus Plugin ID 97817


The remote openSUSE host is missing a security update.


Chromium was updated to 57.0.2987.98 to fix security issues and bugs.

The following vulnerabilities were fixed (bsc#1028848) :

- CVE-2017-5030: Memory corruption in V8

- CVE-2017-5031: Use after free in ANGLE

- CVE-2017-5032: Out of bounds write in PDFium

- CVE-2017-5029: Integer overflow in libxslt

- CVE-2017-5034: Use after free in PDFium

- CVE-2017-5035: Incorrect security UI in Omnibox

- CVE-2017-5036: Use after free in PDFium

- CVE-2017-5037: Multiple out of bounds writes in ChunkDemuxer

- CVE-2017-5039: Use after free in PDFium

- CVE-2017-5040: Information disclosure in V8

- CVE-2017-5041: Address spoofing in Omnibox

- CVE-2017-5033: Bypass of Content Security Policy in Blink

- CVE-2017-5042: Incorrect handling of cookies in Cast

- CVE-2017-5038: Use after free in GuestView

- CVE-2017-5043: Use after free in GuestView

- CVE-2017-5044: Heap overflow in Skia

- CVE-2017-5045: Information disclosure in XSS Auditor

- CVE-2017-5046: Information disclosure in Blink

The following non-security changes are included :

- Address broken rendering on non-intel cards


Update the affected Chromium packages.

See Also

Plugin Details

Severity: Medium

ID: 97817

File Name: openSUSE-2017-353.nasl

Version: 3.9

Type: local

Agent: unix

Published: 2017/03/20

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:chromedriver, p-cpe:/a:novell:opensuse:chromedriver-debuginfo, p-cpe:/a:novell:opensuse:chromium, p-cpe:/a:novell:opensuse:chromium-debuginfo, p-cpe:/a:novell:opensuse:chromium-debugsource, cpe:/o:novell:opensuse:42.1, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/03/17

Vulnerability Publication Date: 2017/04/24

Reference Information

CVE: CVE-2017-5029, CVE-2017-5030, CVE-2017-5031, CVE-2017-5032, CVE-2017-5033, CVE-2017-5034, CVE-2017-5035, CVE-2017-5036, CVE-2017-5037, CVE-2017-5038, CVE-2017-5039, CVE-2017-5040, CVE-2017-5041, CVE-2017-5042, CVE-2017-5043, CVE-2017-5044, CVE-2017-5045, CVE-2017-5046