![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.18.1.2025.0018.1 |
Categoría: | openSUSE Local Security Checks |
Título: | openSUSE Security Advisory (openSUSE-SU-2025:0018-1) |
Resumen: | The remote host is missing an update for the 'chromium' package(s) announced via the openSUSE-SU-2025:0018-1 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'chromium' package(s) announced via the openSUSE-SU-2025:0018-1 advisory. Vulnerability Insight: This update for chromium fixes the following issues: - Chromium 132.0.6834.83 (stable released 2024-01-14) (boo#1235892) * CVE-2025-0434: Out of bounds memory access in V8 * CVE-2025-0435: Inappropriate implementation in Navigation * CVE-2025-0436: Integer overflow in Skia * CVE-2025-0437: Out of bounds read in Metrics * CVE-2025-0438: Stack buffer overflow in Tracing * CVE-2025-0439: Race in Frames * CVE-2025-0440: Inappropriate implementation in Fullscreen * CVE-2025-0441: Inappropriate implementation in Fenced Frames * CVE-2025-0442: Inappropriate implementation in Payments * CVE-2025-0443: Insufficient data validation in Extensions * CVE-2025-0446: Inappropriate implementation in Extensions * CVE-2025-0447: Inappropriate implementation in Navigation * CVE-2025-0448: Inappropriate implementation in Compositing - update esbuild to 0.24.0 - drop old tarball - use upstream release tarball for 0.24.0 - add vendor tarball for golang.org/x/sys - add to keeplibs: third_party/libtess2 third_party/devtools-frontend/src/node_modules/fast-glob Affected Software/OS: 'chromium' package(s) on openSUSE Leap 15.6. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2025-0434 Common Vulnerability Exposure (CVE) ID: CVE-2025-0435 Common Vulnerability Exposure (CVE) ID: CVE-2025-0436 Common Vulnerability Exposure (CVE) ID: CVE-2025-0437 Common Vulnerability Exposure (CVE) ID: CVE-2025-0438 Common Vulnerability Exposure (CVE) ID: CVE-2025-0439 Common Vulnerability Exposure (CVE) ID: CVE-2025-0440 Common Vulnerability Exposure (CVE) ID: CVE-2025-0441 Common Vulnerability Exposure (CVE) ID: CVE-2025-0442 Common Vulnerability Exposure (CVE) ID: CVE-2025-0443 Common Vulnerability Exposure (CVE) ID: CVE-2025-0446 Common Vulnerability Exposure (CVE) ID: CVE-2025-0447 Common Vulnerability Exposure (CVE) ID: CVE-2025-0448 |
Copyright | Copyright (C) 2025 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |