Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2024.0150
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2024-0150)
Zusammenfassung:The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2024-0150 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2024-0150 advisory.

Vulnerability Insight:
The chromium-browser-stable package has been updated to the
124.0.6367.60 release. It includes 23 security fixes.
Please, do note, only x86_64 is supported from now on.
i586 support for linux was stopped some years ago and the community is
not able to provide patches anymore for the latest Chromium code.
Some of the security fixes are:
* High CVE-2024-3832: Object corruption in V8. Reported by Man Yue Mo of
GitHub Security Lab on 2024-03-27
* High CVE-2024-3833: Object corruption in WebAssembly. Reported by Man
Yue Mo of GitHub Security Lab on 2024-03-27
* High CVE-2024-3914: Use after free in V8. Reported by Seunghyun Lee
(@0x10n) of KAIST Hacking Lab, via Pwn2Own 2024 on 2024-03-21
* High CVE-2024-3834: Use after free in Downloads. Reported by
ChaobinZhang on 2024-02-24
* Medium CVE-2024-3837: Use after free in QUIC. Reported by {rotiple,
dch3ck} of CW Research Inc. on 2024-01-15
* Medium CVE-2024-3838: Inappropriate implementation in Autofill.
Reported by KiriminAja on 2024-03-06
* Medium CVE-2024-3839: Out of bounds read in Fonts. Reported by Ronald
Crane (Zippenhop LLC) on 2024-01-16
* Medium CVE-2024-3840: Insufficient policy enforcement in Site
Isolation. Reported by Ahmed ElMasry on 2024-01-22
* Medium CVE-2024-3841: Insufficient data validation in Browser
Switcher. Reported by Oleg on 2024-03-19
* Medium CVE-2024-3843: Insufficient data validation in Downloads.
Reported by Azur on 2023-12-24
* Low CVE-2024-3844: Inappropriate implementation in Extensions.
Reported by Alesandro Ortiz on 2022-02-23
* Low CVE-2024-3845: Inappropriate implementation in Network. Reported
by Daniel Baulig on 2024-02-03
* Low CVE-2024-3846: Inappropriate implementation in Prompts. Reported
by Ahmed ElMasry on 2023-05-23
* Low CVE-2024-3847: Insufficient policy enforcement in WebUI. Reported
by Yan Zhu on 2024-03-08
* High CVE-2024-3157: Out of bounds write in Compositing. Reported by
DarkNavy on 2024-03-26
* High CVE-2024-3516: Heap buffer overflow in ANGLE. Reported by Bao
(zx) Pham and Toan (suto) Pham of Qrious Secure on 2024-03-09
* High CVE-2024-3515: Use after free in Dawn. Reported by wgslfuzz on
2024-03-25

Affected Software/OS:
'chromium-browser-stable' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2024-3157
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/
https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html
https://issues.chromium.org/issues/331237485
Common Vulnerability Exposure (CVE) ID: CVE-2024-3515
https://issues.chromium.org/issues/331123811
Common Vulnerability Exposure (CVE) ID: CVE-2024-3516
https://issues.chromium.org/issues/328859176
Common Vulnerability Exposure (CVE) ID: CVE-2024-3832
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/
https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html
https://issues.chromium.org/issues/331358160
Common Vulnerability Exposure (CVE) ID: CVE-2024-3833
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/
https://issues.chromium.org/issues/331383939
Common Vulnerability Exposure (CVE) ID: CVE-2024-3834
https://issues.chromium.org/issues/326607008
Common Vulnerability Exposure (CVE) ID: CVE-2024-3837
https://issues.chromium.org/issues/41491379
Common Vulnerability Exposure (CVE) ID: CVE-2024-3838
https://issues.chromium.org/issues/328278717
Common Vulnerability Exposure (CVE) ID: CVE-2024-3839
https://issues.chromium.org/issues/41491859
Common Vulnerability Exposure (CVE) ID: CVE-2024-3840
https://issues.chromium.org/issues/41493458
Common Vulnerability Exposure (CVE) ID: CVE-2024-3841
https://issues.chromium.org/issues/330376742
Common Vulnerability Exposure (CVE) ID: CVE-2024-3843
https://issues.chromium.org/issues/41486690
Common Vulnerability Exposure (CVE) ID: CVE-2024-3844
https://issues.chromium.org/issues/40058873
Common Vulnerability Exposure (CVE) ID: CVE-2024-3845
https://issues.chromium.org/issues/323583084
Common Vulnerability Exposure (CVE) ID: CVE-2024-3846
https://issues.chromium.org/issues/40064754
Common Vulnerability Exposure (CVE) ID: CVE-2024-3847
https://issues.chromium.org/issues/328690293
Common Vulnerability Exposure (CVE) ID: CVE-2024-3914
https://issues.chromium.org/issues/330759272
CopyrightCopyright (C) 2024 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.