Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.856034
Categoría:openSUSE Local Security Checks
Título:openSUSE Security Advisory (openSUSE-SU-2024:0084-1)
Resumen:The remote host is missing an update for the 'chromium' package(s) announced via the openSUSE-SU-2024:0084-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'chromium' package(s) announced via the openSUSE-SU-2024:0084-1 advisory.

Vulnerability Insight:
This update for chromium fixes the following issue:

Chromium 122.0.6261.128 (boo#1221335)

* CVE-2024-2400: Use after free in Performance Manager


Chromium 122.0.6261.111 (boo#1220131,boo#1220604,boo#1221105)

* New upstream security release.
* CVE-2024-2173: Out of bounds memory access in V8.
* CVE-2024-2174: Inappropriate implementation in V8.
* CVE-2024-2176: Use after free in FedCM.

Chromium 122.0.6261.94

* CVE-2024-1669: Out of bounds memory access in Blink.
* CVE-2024-1670: Use after free in Mojo.
* CVE-2024-1671: Inappropriate implementation in Site Isolation.
* CVE-2024-1672: Inappropriate implementation in Content Security Policy.
* CVE-2024-1673: Use after free in Accessibility.
* CVE-2024-1674: Inappropriate implementation in Navigation.
* CVE-2024-1675: Insufficient policy enforcement in Download.
* CVE-2024-1676: Inappropriate implementation in Navigation.
* Type Confusion in V8

Affected Software/OS:
'chromium' package(s) on openSUSE Leap 15.5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2024-1669
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/
https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html
https://issues.chromium.org/issues/41495060
Common Vulnerability Exposure (CVE) ID: CVE-2024-1670
https://issues.chromium.org/issues/41481374
Common Vulnerability Exposure (CVE) ID: CVE-2024-1671
https://issues.chromium.org/issues/41487933
Common Vulnerability Exposure (CVE) ID: CVE-2024-1672
https://issues.chromium.org/issues/41485789
Common Vulnerability Exposure (CVE) ID: CVE-2024-1673
https://issues.chromium.org/issues/41490491
Common Vulnerability Exposure (CVE) ID: CVE-2024-1674
https://issues.chromium.org/issues/40095183
Common Vulnerability Exposure (CVE) ID: CVE-2024-1675
https://issues.chromium.org/issues/41486208
Common Vulnerability Exposure (CVE) ID: CVE-2024-1676
https://issues.chromium.org/issues/40944847
Common Vulnerability Exposure (CVE) ID: CVE-2024-2173
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/
https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html
https://issues.chromium.org/issues/325893559
Common Vulnerability Exposure (CVE) ID: CVE-2024-2174
https://issues.chromium.org/issues/325866363
Common Vulnerability Exposure (CVE) ID: CVE-2024-2176
https://issues.chromium.org/issues/325936438
Common Vulnerability Exposure (CVE) ID: CVE-2024-2400
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T55OZ7JOMLNT5ICM4DTCZOJZD6TZICKO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIKPDCUMQNF2DFB7TU3V4ISJ7WFJH7YI/
https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_12.html
https://issues.chromium.org/issues/327696052
CopyrightCopyright (C) 2024 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.