SB2016051616 - OpenSUSE Linux update for Chromium 



SB2016051616 - OpenSUSE Linux update for Chromium

Published: May 16, 2016

Security Bulletin ID SB2016051616
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 25% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2016-1667)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The TreeScope::adoptIfNeeded function in WebKit/Source/core/dom/TreeScope.cpp in the DOM implementation in Blink, as used in Google Chrome before 50.0.2661.102, does not prevent script execution during node-adoption operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.


2) Improper access control (CVE-ID: CVE-2016-1668)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The forEachForBinding function in WebKit/Source/bindings/core/v8/Iterable.h in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.102, uses an improper creation context, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.


3) Buffer overflow (CVE-ID: CVE-2016-1669)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to buffer overflow in the zone.cc. A remote attacker can send specially crafted JavaScript code, trigger buffer overflow and cause the application to crash.

Successful exploitation of the vulnerability may result in system compromise.

4) Race condition (CVE-ID: CVE-2016-1670)

The vulnerability allows a remote non-authenticated attacker to manipulate data.

Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID.


Remediation

Install update from vendor's website.