Lucene search

K
mageiaGentoo FoundationMGASA-2024-0150
HistoryApr 27, 2024 - 3:37 a.m.

Updated chromium-browser-stable packages fix security vulnerabilities

2024-04-2703:37:18
Gentoo Foundation
advisories.mageia.org
25
chromium-browser-stable
security vulnerabilities
update
x86_64
object corruption
webassembly
use after free
v8
quic
autofill
fonts
site isolation
browser switcher
downloads
extensions
network
prompts
webui
compositing
angle
dawn

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.8%

The chromium-browser-stable package has been updated to the 124.0.6367.60 release. It includes 23 security fixes. Please, do note, only x86_64 is supported from now on. i586 support for linux was stopped some years ago and the community is not able to provide patches anymore for the latest Chromium code. Some of the security fixes are: * High CVE-2024-3832: Object corruption in V8. Reported by Man Yue Mo of GitHub Security Lab on 2024-03-27 * High CVE-2024-3833: Object corruption in WebAssembly. Reported by Man Yue Mo of GitHub Security Lab on 2024-03-27 * High CVE-2024-3914: Use after free in V8. Reported by Seunghyun Lee (@0x10n) of KAIST Hacking Lab, via Pwn2Own 2024 on 2024-03-21 * High CVE-2024-3834: Use after free in Downloads. Reported by ChaobinZhang on 2024-02-24 * Medium CVE-2024-3837: Use after free in QUIC. Reported by {rotiple, dch3ck} of CW Research Inc. on 2024-01-15 * Medium CVE-2024-3838: Inappropriate implementation in Autofill. Reported by KiriminAja on 2024-03-06 * Medium CVE-2024-3839: Out of bounds read in Fonts. Reported by Ronald Crane (Zippenhop LLC) on 2024-01-16 * Medium CVE-2024-3840: Insufficient policy enforcement in Site Isolation. Reported by Ahmed ElMasry on 2024-01-22 * Medium CVE-2024-3841: Insufficient data validation in Browser Switcher. Reported by Oleg on 2024-03-19 * Medium CVE-2024-3843: Insufficient data validation in Downloads. Reported by Azur on 2023-12-24 * Low CVE-2024-3844: Inappropriate implementation in Extensions. Reported by Alesandro Ortiz on 2022-02-23 * Low CVE-2024-3845: Inappropriate implementation in Network. Reported by Daniel Baulig on 2024-02-03 * Low CVE-2024-3846: Inappropriate implementation in Prompts. Reported by Ahmed ElMasry on 2023-05-23 * Low CVE-2024-3847: Insufficient policy enforcement in WebUI. Reported by Yan Zhu on 2024-03-08 * High CVE-2024-3157: Out of bounds write in Compositing. Reported by DarkNavy on 2024-03-26 * High CVE-2024-3516: Heap buffer overflow in ANGLE. Reported by Bao (zx) Pham and Toan (suto) Pham of Qrious Secure on 2024-03-09 * High CVE-2024-3515: Use after free in Dawn. Reported by wgslfuzz on 2024-03-25

OSVersionArchitecturePackageVersionFilename
Mageia9noarchchromium-browser-stable< 124.0.6367.60-1chromium-browser-stable-124.0.6367.60-1.mga9.tainted

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.8%