![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.18.1.2025.0018.1 |
Category: | openSUSE Local Security Checks |
Title: | openSUSE Security Advisory (openSUSE-SU-2025:0018-1) |
Summary: | The remote host is missing an update for the 'chromium' package(s) announced via the openSUSE-SU-2025:0018-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'chromium' package(s) announced via the openSUSE-SU-2025:0018-1 advisory. Vulnerability Insight: This update for chromium fixes the following issues: - Chromium 132.0.6834.83 (stable released 2024-01-14) (boo#1235892) * CVE-2025-0434: Out of bounds memory access in V8 * CVE-2025-0435: Inappropriate implementation in Navigation * CVE-2025-0436: Integer overflow in Skia * CVE-2025-0437: Out of bounds read in Metrics * CVE-2025-0438: Stack buffer overflow in Tracing * CVE-2025-0439: Race in Frames * CVE-2025-0440: Inappropriate implementation in Fullscreen * CVE-2025-0441: Inappropriate implementation in Fenced Frames * CVE-2025-0442: Inappropriate implementation in Payments * CVE-2025-0443: Insufficient data validation in Extensions * CVE-2025-0446: Inappropriate implementation in Extensions * CVE-2025-0447: Inappropriate implementation in Navigation * CVE-2025-0448: Inappropriate implementation in Compositing - update esbuild to 0.24.0 - drop old tarball - use upstream release tarball for 0.24.0 - add vendor tarball for golang.org/x/sys - add to keeplibs: third_party/libtess2 third_party/devtools-frontend/src/node_modules/fast-glob Affected Software/OS: 'chromium' package(s) on openSUSE Leap 15.6. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2025-0434 Common Vulnerability Exposure (CVE) ID: CVE-2025-0435 Common Vulnerability Exposure (CVE) ID: CVE-2025-0436 Common Vulnerability Exposure (CVE) ID: CVE-2025-0437 Common Vulnerability Exposure (CVE) ID: CVE-2025-0438 Common Vulnerability Exposure (CVE) ID: CVE-2025-0439 Common Vulnerability Exposure (CVE) ID: CVE-2025-0440 Common Vulnerability Exposure (CVE) ID: CVE-2025-0441 Common Vulnerability Exposure (CVE) ID: CVE-2025-0442 Common Vulnerability Exposure (CVE) ID: CVE-2025-0443 Common Vulnerability Exposure (CVE) ID: CVE-2025-0446 Common Vulnerability Exposure (CVE) ID: CVE-2025-0447 Common Vulnerability Exposure (CVE) ID: CVE-2025-0448 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |