English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.852183
Category:SuSE Local Security Checks
Title:SuSE Update for Chromium openSUSE-SU-2018:4142-1 (Chromium)
Summary:The remote host is missing an update for the 'Chromium'; package(s) announced via the openSUSE-SU-2018:4142_1 advisory.
Description:Summary:
The remote host is missing an update for the 'Chromium'
package(s) announced via the openSUSE-SU-2018:4142_1 advisory.

Vulnerability Insight:
This update to Chromium 71.0.3578.98 fixes the
following issues:

Security issues fixed (boo#1118529):

- CVE-2018-17480: Out of bounds write in V8

- CVE-2018-17481: Use after frees in PDFium

- CVE-2018-18335: Heap buffer overflow in Skia

- CVE-2018-18336: Use after free in PDFium

- CVE-2018-18337: Use after free in Blink

- CVE-2018-18338: Heap buffer overflow in Canvas

- CVE-2018-18339: Use after free in WebAudio

- CVE-2018-18340: Use after free in MediaRecorder

- CVE-2018-18341: Heap buffer overflow in Blink

- CVE-2018-18342: Out of bounds write in V8

- CVE-2018-18343: Use after free in Skia

- CVE-2018-18344: Inappropriate implementation in Extensions

- Multiple issues in SQLite via WebSQL

- CVE-2018-18345: Inappropriate implementation in Site Isolation

- CVE-2018-18346: Incorrect security UI in Blink

- CVE-2018-18347: Inappropriate implementation in Navigation

- CVE-2018-18348: Inappropriate implementation in Omnibox

- CVE-2018-18349: Insufficient policy enforcement in Blink

- CVE-2018-18350: Insufficient policy enforcement in Blink

- CVE-2018-18351: Insufficient policy enforcement in Navigation

- CVE-2018-18352: Inappropriate implementation in Media

- CVE-2018-18353: Inappropriate implementation in Network Authentication

- CVE-2018-18354: Insufficient data validation in Shell Integration

- CVE-2018-18355: Insufficient policy enforcement in URL Formatter

- CVE-2018-18356: Use after free in Skia

- CVE-2018-18357: Insufficient policy enforcement in URL Formatter

- CVE-2018-18358: Insufficient policy enforcement in Proxy

- CVE-2018-18359: Out of bounds read in V8

- Inappropriate implementation in PDFium

- Use after free in Extensions

- Inappropriate implementation in Navigation

- Insufficient policy enforcement in Navigation

- Insufficient policy enforcement in URL Formatter

- Various fixes from internal audits, fuzzing and other initiatives

- CVE-2018-17481: Use after free in PDFium (boo#1119364)

The following changes are included:

- advertisements posing as error messages are now blocked

- Automatic playing of content at page load mostly disabled

- New JavaScript API for relative time display


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-1557=1

Affected Software/OS:
Chromium on openSUSE Leap 42.3.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-17480
Common Vulnerability Exposure (CVE) ID: CVE-2018-17481
Common Vulnerability Exposure (CVE) ID: CVE-2018-18335
Common Vulnerability Exposure (CVE) ID: CVE-2018-18336
Common Vulnerability Exposure (CVE) ID: CVE-2018-18337
Common Vulnerability Exposure (CVE) ID: CVE-2018-18338
Common Vulnerability Exposure (CVE) ID: CVE-2018-18339
Common Vulnerability Exposure (CVE) ID: CVE-2018-18340
Common Vulnerability Exposure (CVE) ID: CVE-2018-18341
Common Vulnerability Exposure (CVE) ID: CVE-2018-18342
Common Vulnerability Exposure (CVE) ID: CVE-2018-18343
Common Vulnerability Exposure (CVE) ID: CVE-2018-18344
Common Vulnerability Exposure (CVE) ID: CVE-2018-18345
Common Vulnerability Exposure (CVE) ID: CVE-2018-18346
Common Vulnerability Exposure (CVE) ID: CVE-2018-18347
Common Vulnerability Exposure (CVE) ID: CVE-2018-18348
Common Vulnerability Exposure (CVE) ID: CVE-2018-18349
Common Vulnerability Exposure (CVE) ID: CVE-2018-18350
Common Vulnerability Exposure (CVE) ID: CVE-2018-18351
Common Vulnerability Exposure (CVE) ID: CVE-2018-18352
Common Vulnerability Exposure (CVE) ID: CVE-2018-18353
Common Vulnerability Exposure (CVE) ID: CVE-2018-18354
Common Vulnerability Exposure (CVE) ID: CVE-2018-18355
Common Vulnerability Exposure (CVE) ID: CVE-2018-18356
Common Vulnerability Exposure (CVE) ID: CVE-2018-18357
Common Vulnerability Exposure (CVE) ID: CVE-2018-18358
Common Vulnerability Exposure (CVE) ID: CVE-2018-18359
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.