![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2023.0355 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2023-0355) |
Summary: | The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2023-0355 advisory. |
Description: | Summary: The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2023-0355 advisory. Vulnerability Insight: The chromium-browser-stable package has been updated to the 120.0.6099.129 release, fixing bugs and 20 vulnerabilities, together with 120.0.6099.109, 120.0.6099.71 and 120.0.6099.62, some of them are listed below. High CVE-2023-6508: Use after free in Media Stream. Reported by Cassidy Kim(@cassidy6564) on 2023-10-31 High CVE-2023-6509: Use after free in Side Panel Search. Reported by Khalil Zhani on 2023-10-21 Medium CVE-2023-6510: Use after free in Media Capture. Reported by [pwn2car] on 2023-09-08 Low CVE-2023-6511: Inappropriate implementation in Autofill. Reported by Ahmed ElMasry on 2023-09-04 Low CVE-2023-6512: Inappropriate implementation in Web Browser UI. Reported by Om Apip on 2023-06-24 High CVE-2023-6702: Type Confusion in V8. Reported by Zhiyi Zhang and Zhunki from Codesafe Team of Legendsec at Qi'anxin Group on 2023-11-10 High CVE-2023-6703: Use after free in Blink. Reported by Cassidy Kim(@cassidy6564) on 2023-11-14 High CVE-2023-6704: Use after free in libavif. Reported by Fudan University on 2023-11-23 High CVE-2023-6705: Use after free in WebRTC. Reported by Cassidy Kim(@cassidy6564) on 2023-11-28 High CVE-2023-6706: Use after free in FedCM. Reported by anonymous on 2023-11-09 Medium CVE-2023-6707: Use after free in CSS. Reported by @ginggilBesel on 2023-11-21 High CVE-2023-7024: Heap buffer overflow in WebRTC. Reported by Clement Lecigne and Vlad Stolyarov of Google's Threat Analysis Group on 2023-12-19 Google is aware that an exploit for CVE-2023-7024 exists in the wild. Affected Software/OS: 'chromium-browser-stable' package(s) on Mageia 9. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2023-6508 Debian Security Information: DSA-5573 (Google Search) https://www.debian.org/security/2023/dsa-5573 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/ https://security.gentoo.org/glsa/202401-34 https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html https://crbug.com/1497984 Common Vulnerability Exposure (CVE) ID: CVE-2023-6509 https://crbug.com/1494565 Common Vulnerability Exposure (CVE) ID: CVE-2023-6510 https://crbug.com/1480152 Common Vulnerability Exposure (CVE) ID: CVE-2023-6511 https://crbug.com/1478613 Common Vulnerability Exposure (CVE) ID: CVE-2023-6512 https://crbug.com/1457702 Common Vulnerability Exposure (CVE) ID: CVE-2023-6702 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/ https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html https://crbug.com/1501326 Common Vulnerability Exposure (CVE) ID: CVE-2023-6703 https://crbug.com/1502102 Common Vulnerability Exposure (CVE) ID: CVE-2023-6704 https://crbug.com/1504792 Common Vulnerability Exposure (CVE) ID: CVE-2023-6705 https://crbug.com/1505708 Common Vulnerability Exposure (CVE) ID: CVE-2023-6706 https://crbug.com/1500921 Common Vulnerability Exposure (CVE) ID: CVE-2023-6707 https://crbug.com/1504036 Common Vulnerability Exposure (CVE) ID: CVE-2023-7024 Debian Security Information: DSA-5585 (Google Search) https://www.debian.org/security/2023/dsa-5585 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/ https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html https://crbug.com/1513170 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |