Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2023.0355
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2023-0355)
Zusammenfassung:The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2023-0355 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2023-0355 advisory.

Vulnerability Insight:
The chromium-browser-stable package has been updated to the
120.0.6099.129 release, fixing bugs and 20 vulnerabilities, together
with 120.0.6099.109, 120.0.6099.71 and 120.0.6099.62, some of them are
listed below.
High CVE-2023-6508: Use after free in Media Stream. Reported by Cassidy
Kim(@cassidy6564) on 2023-10-31
High CVE-2023-6509: Use after free in Side Panel Search. Reported by
Khalil Zhani on 2023-10-21
Medium CVE-2023-6510: Use after free in Media Capture. Reported by
[pwn2car] on 2023-09-08
Low CVE-2023-6511: Inappropriate implementation in Autofill. Reported
by Ahmed ElMasry on 2023-09-04
Low CVE-2023-6512: Inappropriate implementation in Web Browser UI.
Reported by Om Apip on 2023-06-24
High CVE-2023-6702: Type Confusion in V8. Reported by Zhiyi Zhang and
Zhunki from Codesafe Team of Legendsec at Qi'anxin Group on 2023-11-10
High CVE-2023-6703: Use after free in Blink. Reported by Cassidy
Kim(@cassidy6564) on 2023-11-14
High CVE-2023-6704: Use after free in libavif. Reported by Fudan
University on 2023-11-23
High CVE-2023-6705: Use after free in WebRTC. Reported by Cassidy
Kim(@cassidy6564) on 2023-11-28
High CVE-2023-6706: Use after free in FedCM. Reported by anonymous on
2023-11-09
Medium CVE-2023-6707: Use after free in CSS. Reported by @ginggilBesel
on 2023-11-21
High CVE-2023-7024: Heap buffer overflow in WebRTC. Reported by Clement
Lecigne and Vlad Stolyarov of Google's Threat Analysis Group on
2023-12-19
Google is aware that an exploit for CVE-2023-7024 exists in the wild.

Affected Software/OS:
'chromium-browser-stable' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-6508
Debian Security Information: DSA-5573 (Google Search)
https://www.debian.org/security/2023/dsa-5573
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/
https://security.gentoo.org/glsa/202401-34
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
https://crbug.com/1497984
Common Vulnerability Exposure (CVE) ID: CVE-2023-6509
https://crbug.com/1494565
Common Vulnerability Exposure (CVE) ID: CVE-2023-6510
https://crbug.com/1480152
Common Vulnerability Exposure (CVE) ID: CVE-2023-6511
https://crbug.com/1478613
Common Vulnerability Exposure (CVE) ID: CVE-2023-6512
https://crbug.com/1457702
Common Vulnerability Exposure (CVE) ID: CVE-2023-6702
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
https://crbug.com/1501326
Common Vulnerability Exposure (CVE) ID: CVE-2023-6703
https://crbug.com/1502102
Common Vulnerability Exposure (CVE) ID: CVE-2023-6704
https://crbug.com/1504792
Common Vulnerability Exposure (CVE) ID: CVE-2023-6705
https://crbug.com/1505708
Common Vulnerability Exposure (CVE) ID: CVE-2023-6706
https://crbug.com/1500921
Common Vulnerability Exposure (CVE) ID: CVE-2023-6707
https://crbug.com/1504036
Common Vulnerability Exposure (CVE) ID: CVE-2023-7024
Debian Security Information: DSA-5585 (Google Search)
https://www.debian.org/security/2023/dsa-5585
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html
https://crbug.com/1513170
CopyrightCopyright (C) 2023 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.