![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2015.0164 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2015-0164) |
Resumen: | The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2015-0164 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2015-0164 advisory. Vulnerability Insight: Chromium-browser 42.0.2311.90 fixes several security issues, among others a cross-origin-bypass in HTML parser (CVE-2015-1235), a cross-origin-bypass in Blink (CVE-2015-1236), a use-after-free in IPC (CVE-2015-1237), an out-of-bounds write in Skia (CVE-2015-1238), an out-of-bounds read in WebGL (CVE-2015-1240), Tap-Jacking (CVE-2015-1241), type confusion in V8 (CVE-2015-1242), HSTS bypass in WebSockets (CVE-2015-1244), a use-after-free in PDFium (CVE-2015-1245), an out-of-bounds read in Blink (CVE-2015-1246), scheme issues in OpenSearch, (CVE-2015-1247), and a SafeBrowsing bypass (CVE-2015-1248). Also included are various fixes from internal audits, fuzzing and other initiatives (CVE-2015-1249), and multiple vulnerabilities in V8 have been fixed at the tip of the 4.2 branch (currently 4.2.77.14) (CVE-2015-3333). Affected Software/OS: 'chromium-browser-stable' package(s) on Mageia 4. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-1235 Debian Security Information: DSA-3238 (Google Search) http://www.debian.org/security/2015/dsa-3238 https://security.gentoo.org/glsa/201506-04 RedHat Security Advisories: RHSA-2015:0816 http://rhn.redhat.com/errata/RHSA-2015-0816.html http://www.securitytracker.com/id/1032209 SuSE Security Announcement: openSUSE-SU-2015:0748 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html SuSE Security Announcement: openSUSE-SU-2015:1887 (Google Search) http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html http://ubuntu.com/usn/USN-2570-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-1236 http://ubuntu.com/usn/usn-2570-1 Common Vulnerability Exposure (CVE) ID: CVE-2015-1237 Common Vulnerability Exposure (CVE) ID: CVE-2015-1238 Common Vulnerability Exposure (CVE) ID: CVE-2015-1240 Common Vulnerability Exposure (CVE) ID: CVE-2015-1241 Common Vulnerability Exposure (CVE) ID: CVE-2015-1242 Common Vulnerability Exposure (CVE) ID: CVE-2015-1244 Common Vulnerability Exposure (CVE) ID: CVE-2015-1245 Common Vulnerability Exposure (CVE) ID: CVE-2015-1246 Common Vulnerability Exposure (CVE) ID: CVE-2015-1247 Common Vulnerability Exposure (CVE) ID: CVE-2015-1248 Common Vulnerability Exposure (CVE) ID: CVE-2015-1249 Common Vulnerability Exposure (CVE) ID: CVE-2015-3333 BugTraq ID: 74221 http://www.securityfocus.com/bid/74221 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |