Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-2885 (GCVE-0-2024-2885)
Vulnerability from cvelistv5
- Use after free
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "chrome",
"vendor": "google",
"versions": [
{
"lessThan": "123.0.6312.86",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "fedora",
"vendor": "fedoraproject",
"versions": [
{
"lessThan": "1.fc40",
"status": "affected",
"version": "40",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-2885",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-30T04:00:28.577269Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T15:25:32.912Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:25:42.151Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://issues.chromium.org/issues/328958020"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "123.0.6312.86",
"status": "affected",
"version": "123.0.6312.86",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use after free",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-29T02:06:05.145Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
},
{
"url": "https://issues.chromium.org/issues/328958020"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2024-2885",
"datePublished": "2024-03-26T20:09:33.968Z",
"dateReserved": "2024-03-26T00:14:00.436Z",
"dateUpdated": "2025-03-18T15:25:32.912Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-2885\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2024-03-26T21:15:53.220\",\"lastModified\":\"2025-03-18T16:15:21.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\"},{\"lang\":\"es\",\"value\":\"Use after free en Dawn en Google Chrome anterior a 123.0.6312.86 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"123.0.6312.86\",\"matchCriteriaId\":\"EA944B1D-8AA9-4C37-BD3B-2B10B3662D54\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA277A6C-83EC-4536-9125-97B84C4FAF59\"}]}]}],\"references\":[{\"url\":\"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://issues.chromium.org/issues/328958020\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://issues.chromium.org/issues/328958020\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://issues.chromium.org/issues/328958020\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T19:25:42.151Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-2885\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-30T04:00:28.577269Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"chrome\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"123.0.6312.86\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*\"], \"vendor\": \"fedoraproject\", \"product\": \"fedora\", \"versions\": [{\"status\": \"affected\", \"version\": \"40\", \"lessThan\": \"1.fc40\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-30T13:28:38.313Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Google\", \"product\": \"Chrome\", \"versions\": [{\"status\": \"affected\", \"version\": \"123.0.6312.86\", \"lessThan\": \"123.0.6312.86\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html\"}, {\"url\": \"https://issues.chromium.org/issues/328958020\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Use after free\"}]}], \"providerMetadata\": {\"orgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"shortName\": \"Chrome\", \"dateUpdated\": \"2024-03-29T02:06:05.145Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-2885\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-18T15:25:32.912Z\", \"dateReserved\": \"2024-03-26T00:14:00.436Z\", \"assignerOrgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"datePublished\": \"2024-03-26T20:09:33.968Z\", \"assignerShortName\": \"Chrome\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
WID-SEC-W-2024-0723
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Chrome ist ein Internet-Browser von Google.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Chrome ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0723 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0723.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0723 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0723"
},
{
"category": "external",
"summary": "Stable Channel Update for Desktop vom 2024-03-26",
"url": "http://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
},
{
"category": "external",
"summary": "Microsoft Edge Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2883"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-85531C965E vom 2024-03-28",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-85531c965e"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-B4DAB205D7 vom 2024-03-27",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-b4dab205d7"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-0BB0E8F2A0 vom 2024-03-27",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-0bb0e8f2a0"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5648 vom 2024-03-29",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00056.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-3CB841C5F0 vom 2024-04-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-3cb841c5f0"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-FE061342CA vom 2024-04-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-fe061342ca"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-7BC0A1D338 vom 2024-04-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-7bc0a1d338"
},
{
"category": "external",
"summary": "IGEL Security Notice ISN-2024-10 vom 2024-04-15",
"url": "https://kb.igel.com/securitysafety/en/isn-2024-10-chromium-critical-vulnerability-122882072.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0123-1 vom 2024-05-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2S7S4HVABEMIRHPQD4H3O6EA36PLCUCI/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0123-1 vom 2024-05-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2S7S4HVABEMIRHPQD4H3O6EA36PLCUCI/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0122-1 vom 2024-05-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/FDYESS3DGR73AJ5JNOISN7IW6IOWRXSC/"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202412-05 vom 2024-12-07",
"url": "https://security.gentoo.org/glsa/202412-05"
}
],
"source_lang": "en-US",
"title": "Google Chrome: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2024-12-08T23:00:00.000+00:00",
"generator": {
"date": "2024-12-09T09:21:11.255+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-0723",
"initial_release_date": "2024-03-26T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-03-26T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-03-27T23:00:00.000+00:00",
"number": "2",
"summary": "Exploit aufgenommen"
},
{
"date": "2024-04-01T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-04-14T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IGEL aufgenommen"
},
{
"date": "2024-05-12T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Pr\u00fcfung Produkteintragung"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Gentoo aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c123.0.6312.86",
"product": {
"name": "Google Chrome \u003c123.0.6312.86",
"product_id": "T033687"
}
},
{
"category": "product_version",
"name": "123.0.6312.86",
"product": {
"name": "Google Chrome 123.0.6312.86",
"product_id": "T033687-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:123.0.6312.86"
}
}
},
{
"category": "product_version_range",
"name": "\u003c123.0.6312.87",
"product": {
"name": "Google Chrome \u003c123.0.6312.87",
"product_id": "T033688"
}
},
{
"category": "product_version",
"name": "123.0.6312.87",
"product": {
"name": "Google Chrome 123.0.6312.87",
"product_id": "T033688-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:123.0.6312.87"
}
}
}
],
"category": "product_name",
"name": "Chrome"
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "IGEL OS",
"product": {
"name": "IGEL OS",
"product_id": "T017865",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:-"
}
}
}
],
"category": "vendor",
"name": "IGEL"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2883",
"notes": [
{
"category": "description",
"text": "In Google Chrome existieren mehrere Schwachstellen. Diese sind auf eine Type Confusion und Use-after-Free-Fehler zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T033688",
"T033687",
"2951",
"T017865",
"T027843",
"T012167",
"74185"
]
},
"release_date": "2024-03-26T23:00:00.000+00:00",
"title": "CVE-2024-2883"
},
{
"cve": "CVE-2024-2885",
"notes": [
{
"category": "description",
"text": "In Google Chrome existieren mehrere Schwachstellen. Diese sind auf eine Type Confusion und Use-after-Free-Fehler zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T033688",
"T033687",
"2951",
"T017865",
"T027843",
"T012167",
"74185"
]
},
"release_date": "2024-03-26T23:00:00.000+00:00",
"title": "CVE-2024-2885"
},
{
"cve": "CVE-2024-2886",
"notes": [
{
"category": "description",
"text": "In Google Chrome existieren mehrere Schwachstellen. Diese sind auf eine Type Confusion und Use-after-Free-Fehler zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T033688",
"T033687",
"2951",
"T017865",
"T027843",
"T012167",
"74185"
]
},
"release_date": "2024-03-26T23:00:00.000+00:00",
"title": "CVE-2024-2886"
},
{
"cve": "CVE-2024-2887",
"notes": [
{
"category": "description",
"text": "In Google Chrome existieren mehrere Schwachstellen. Diese sind auf eine Type Confusion und Use-after-Free-Fehler zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T033688",
"T033687",
"2951",
"T017865",
"T027843",
"T012167",
"74185"
]
},
"release_date": "2024-03-26T23:00:00.000+00:00",
"title": "CVE-2024-2887"
}
]
}
wid-sec-w-2024-0723
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Chrome ist ein Internet-Browser von Google.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Chrome ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0723 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0723.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0723 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0723"
},
{
"category": "external",
"summary": "Stable Channel Update for Desktop vom 2024-03-26",
"url": "http://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
},
{
"category": "external",
"summary": "Microsoft Edge Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2883"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-85531C965E vom 2024-03-28",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-85531c965e"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-B4DAB205D7 vom 2024-03-27",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-b4dab205d7"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-0BB0E8F2A0 vom 2024-03-27",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-0bb0e8f2a0"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5648 vom 2024-03-29",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00056.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-3CB841C5F0 vom 2024-04-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-3cb841c5f0"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-FE061342CA vom 2024-04-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-fe061342ca"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-7BC0A1D338 vom 2024-04-05",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-7bc0a1d338"
},
{
"category": "external",
"summary": "IGEL Security Notice ISN-2024-10 vom 2024-04-15",
"url": "https://kb.igel.com/securitysafety/en/isn-2024-10-chromium-critical-vulnerability-122882072.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0123-1 vom 2024-05-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2S7S4HVABEMIRHPQD4H3O6EA36PLCUCI/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0123-1 vom 2024-05-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2S7S4HVABEMIRHPQD4H3O6EA36PLCUCI/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0122-1 vom 2024-05-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/FDYESS3DGR73AJ5JNOISN7IW6IOWRXSC/"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202412-05 vom 2024-12-07",
"url": "https://security.gentoo.org/glsa/202412-05"
}
],
"source_lang": "en-US",
"title": "Google Chrome: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2024-12-08T23:00:00.000+00:00",
"generator": {
"date": "2024-12-09T09:21:11.255+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-0723",
"initial_release_date": "2024-03-26T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-03-26T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-03-27T23:00:00.000+00:00",
"number": "2",
"summary": "Exploit aufgenommen"
},
{
"date": "2024-04-01T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-04-14T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IGEL aufgenommen"
},
{
"date": "2024-05-12T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Pr\u00fcfung Produkteintragung"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Gentoo aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c123.0.6312.86",
"product": {
"name": "Google Chrome \u003c123.0.6312.86",
"product_id": "T033687"
}
},
{
"category": "product_version",
"name": "123.0.6312.86",
"product": {
"name": "Google Chrome 123.0.6312.86",
"product_id": "T033687-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:123.0.6312.86"
}
}
},
{
"category": "product_version_range",
"name": "\u003c123.0.6312.87",
"product": {
"name": "Google Chrome \u003c123.0.6312.87",
"product_id": "T033688"
}
},
{
"category": "product_version",
"name": "123.0.6312.87",
"product": {
"name": "Google Chrome 123.0.6312.87",
"product_id": "T033688-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:123.0.6312.87"
}
}
}
],
"category": "product_name",
"name": "Chrome"
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "IGEL OS",
"product": {
"name": "IGEL OS",
"product_id": "T017865",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:-"
}
}
}
],
"category": "vendor",
"name": "IGEL"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2883",
"notes": [
{
"category": "description",
"text": "In Google Chrome existieren mehrere Schwachstellen. Diese sind auf eine Type Confusion und Use-after-Free-Fehler zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T033688",
"T033687",
"2951",
"T017865",
"T027843",
"T012167",
"74185"
]
},
"release_date": "2024-03-26T23:00:00.000+00:00",
"title": "CVE-2024-2883"
},
{
"cve": "CVE-2024-2885",
"notes": [
{
"category": "description",
"text": "In Google Chrome existieren mehrere Schwachstellen. Diese sind auf eine Type Confusion und Use-after-Free-Fehler zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T033688",
"T033687",
"2951",
"T017865",
"T027843",
"T012167",
"74185"
]
},
"release_date": "2024-03-26T23:00:00.000+00:00",
"title": "CVE-2024-2885"
},
{
"cve": "CVE-2024-2886",
"notes": [
{
"category": "description",
"text": "In Google Chrome existieren mehrere Schwachstellen. Diese sind auf eine Type Confusion und Use-after-Free-Fehler zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T033688",
"T033687",
"2951",
"T017865",
"T027843",
"T012167",
"74185"
]
},
"release_date": "2024-03-26T23:00:00.000+00:00",
"title": "CVE-2024-2886"
},
{
"cve": "CVE-2024-2887",
"notes": [
{
"category": "description",
"text": "In Google Chrome existieren mehrere Schwachstellen. Diese sind auf eine Type Confusion und Use-after-Free-Fehler zur\u00fcckzuf\u00fchren. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T033688",
"T033687",
"2951",
"T017865",
"T027843",
"T012167",
"74185"
]
},
"release_date": "2024-03-26T23:00:00.000+00:00",
"title": "CVE-2024-2887"
}
]
}
wid-sec-w-2024-0738
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Edge ist ein Web Browser von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Microsoft Edge ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0738 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0738.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0738 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0738"
},
{
"category": "external",
"summary": "Release notes for Microsoft Edge Security Updates vom 2024-03-27",
"url": "https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#march-27-2024"
},
{
"category": "external",
"summary": "Microsoft Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2883"
},
{
"category": "external",
"summary": "Microsoft Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2885"
},
{
"category": "external",
"summary": "Microsoft Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2886"
},
{
"category": "external",
"summary": "Microsoft Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2887"
}
],
"source_lang": "en-US",
"title": "Microsoft Edge: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T11:39:17.683+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0738",
"initial_release_date": "2024-03-27T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-03-27T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c123.0.2420.65",
"product": {
"name": "Microsoft Edge \u003c123.0.2420.65",
"product_id": "T033768"
}
},
{
"category": "product_version",
"name": "123.0.2420.65",
"product": {
"name": "Microsoft Edge 123.0.2420.65",
"product_id": "T033768-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:edge:123.0.2420.65"
}
}
},
{
"category": "product_version_range",
"name": "\u003c122.0.2365.113",
"product": {
"name": "Microsoft Edge \u003c122.0.2365.113",
"product_id": "T033769"
}
},
{
"category": "product_version",
"name": "122.0.2365.113",
"product": {
"name": "Microsoft Edge 122.0.2365.113",
"product_id": "T033769-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:edge:122.0.2365.113"
}
}
}
],
"category": "product_name",
"name": "Edge"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2883",
"notes": [
{
"category": "description",
"text": "In Microsoft Edge bestehen mehrere Schwachstellen. Diese Fehler bestehen in den Google-Komponenten ANGLE, Dawn, WebCodecs und WebAssembly aufgrund eines Use-after-free- und eines Typverwechslungsproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T033769",
"T033768"
]
},
"release_date": "2024-03-27T23:00:00.000+00:00",
"title": "CVE-2024-2883"
},
{
"cve": "CVE-2024-2885",
"notes": [
{
"category": "description",
"text": "In Microsoft Edge bestehen mehrere Schwachstellen. Diese Fehler bestehen in den Google-Komponenten ANGLE, Dawn, WebCodecs und WebAssembly aufgrund eines Use-after-free- und eines Typverwechslungsproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T033769",
"T033768"
]
},
"release_date": "2024-03-27T23:00:00.000+00:00",
"title": "CVE-2024-2885"
},
{
"cve": "CVE-2024-2886",
"notes": [
{
"category": "description",
"text": "In Microsoft Edge bestehen mehrere Schwachstellen. Diese Fehler bestehen in den Google-Komponenten ANGLE, Dawn, WebCodecs und WebAssembly aufgrund eines Use-after-free- und eines Typverwechslungsproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T033769",
"T033768"
]
},
"release_date": "2024-03-27T23:00:00.000+00:00",
"title": "CVE-2024-2886"
},
{
"cve": "CVE-2024-2887",
"notes": [
{
"category": "description",
"text": "In Microsoft Edge bestehen mehrere Schwachstellen. Diese Fehler bestehen in den Google-Komponenten ANGLE, Dawn, WebCodecs und WebAssembly aufgrund eines Use-after-free- und eines Typverwechslungsproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T033769",
"T033768"
]
},
"release_date": "2024-03-27T23:00:00.000+00:00",
"title": "CVE-2024-2887"
}
]
}
WID-SEC-W-2024-0738
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Edge ist ein Web Browser von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Microsoft Edge ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0738 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0738.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0738 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0738"
},
{
"category": "external",
"summary": "Release notes for Microsoft Edge Security Updates vom 2024-03-27",
"url": "https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#march-27-2024"
},
{
"category": "external",
"summary": "Microsoft Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2883"
},
{
"category": "external",
"summary": "Microsoft Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2885"
},
{
"category": "external",
"summary": "Microsoft Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2886"
},
{
"category": "external",
"summary": "Microsoft Security Updates vom 2024-03-27",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2887"
}
],
"source_lang": "en-US",
"title": "Microsoft Edge: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T11:39:17.683+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0738",
"initial_release_date": "2024-03-27T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-03-27T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c123.0.2420.65",
"product": {
"name": "Microsoft Edge \u003c123.0.2420.65",
"product_id": "T033768"
}
},
{
"category": "product_version",
"name": "123.0.2420.65",
"product": {
"name": "Microsoft Edge 123.0.2420.65",
"product_id": "T033768-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:edge:123.0.2420.65"
}
}
},
{
"category": "product_version_range",
"name": "\u003c122.0.2365.113",
"product": {
"name": "Microsoft Edge \u003c122.0.2365.113",
"product_id": "T033769"
}
},
{
"category": "product_version",
"name": "122.0.2365.113",
"product": {
"name": "Microsoft Edge 122.0.2365.113",
"product_id": "T033769-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:edge:122.0.2365.113"
}
}
}
],
"category": "product_name",
"name": "Edge"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2883",
"notes": [
{
"category": "description",
"text": "In Microsoft Edge bestehen mehrere Schwachstellen. Diese Fehler bestehen in den Google-Komponenten ANGLE, Dawn, WebCodecs und WebAssembly aufgrund eines Use-after-free- und eines Typverwechslungsproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T033769",
"T033768"
]
},
"release_date": "2024-03-27T23:00:00.000+00:00",
"title": "CVE-2024-2883"
},
{
"cve": "CVE-2024-2885",
"notes": [
{
"category": "description",
"text": "In Microsoft Edge bestehen mehrere Schwachstellen. Diese Fehler bestehen in den Google-Komponenten ANGLE, Dawn, WebCodecs und WebAssembly aufgrund eines Use-after-free- und eines Typverwechslungsproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T033769",
"T033768"
]
},
"release_date": "2024-03-27T23:00:00.000+00:00",
"title": "CVE-2024-2885"
},
{
"cve": "CVE-2024-2886",
"notes": [
{
"category": "description",
"text": "In Microsoft Edge bestehen mehrere Schwachstellen. Diese Fehler bestehen in den Google-Komponenten ANGLE, Dawn, WebCodecs und WebAssembly aufgrund eines Use-after-free- und eines Typverwechslungsproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T033769",
"T033768"
]
},
"release_date": "2024-03-27T23:00:00.000+00:00",
"title": "CVE-2024-2886"
},
{
"cve": "CVE-2024-2887",
"notes": [
{
"category": "description",
"text": "In Microsoft Edge bestehen mehrere Schwachstellen. Diese Fehler bestehen in den Google-Komponenten ANGLE, Dawn, WebCodecs und WebAssembly aufgrund eines Use-after-free- und eines Typverwechslungsproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T033769",
"T033768"
]
},
"release_date": "2024-03-27T23:00:00.000+00:00",
"title": "CVE-2024-2887"
}
]
}
fkie_cve-2024-2885
Vulnerability from fkie_nvd
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| chrome-cve-admin@google.com | https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html | Release Notes | |
| chrome-cve-admin@google.com | https://issues.chromium.org/issues/328958020 | Exploit, Issue Tracking | |
| chrome-cve-admin@google.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/ | Mailing List | |
| chrome-cve-admin@google.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/ | Mailing List | |
| chrome-cve-admin@google.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html | Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.chromium.org/issues/328958020 | Exploit, Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/ | Mailing List |
| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| fedoraproject | fedora | 38 | |
| fedoraproject | fedora | 39 | |
| fedoraproject | fedora | 40 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA944B1D-8AA9-4C37-BD3B-2B10B3662D54",
"versionEndExcluding": "123.0.6312.86",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "Use after free en Dawn en Google Chrome anterior a 123.0.6312.86 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"id": "CVE-2024-2885",
"lastModified": "2025-03-18T16:15:21.350",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-03-26T21:15:53.220",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://issues.chromium.org/issues/328958020"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://issues.chromium.org/issues/328958020"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
ghsa-qccw-wmvp-8pv9
Vulnerability from github
Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
{
"affected": [],
"aliases": [
"CVE-2024-2885"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-03-26T21:15:53Z",
"severity": "HIGH"
},
"details": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"id": "GHSA-qccw-wmvp-8pv9",
"modified": "2024-07-03T18:33:49Z",
"published": "2024-03-26T21:30:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2885"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
},
{
"type": "WEB",
"url": "https://issues.chromium.org/issues/328958020"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2024-AVI-0261
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge Extended Stable versions ant\u00e9rieures \u00e0 122.0.2365.113",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 123.0.2420.65",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-2887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2887"
},
{
"name": "CVE-2024-2883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2883"
},
{
"name": "CVE-2024-2886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2886"
},
{
"name": "CVE-2024-2885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2885"
}
],
"initial_release_date": "2024-03-28T00:00:00",
"last_revision_date": "2024-03-28T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-2886 du 27 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2886"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-2883 du 27 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2883"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-2887 du 27 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2887"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-2885 du 27 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2885"
}
],
"reference": "CERTFR-2024-AVI-0261",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Edge\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 27 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2024-AVI-0254
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Chrome versions ant\u00e9rieures \u00e0 123.0.6312.86 pour Linux",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
},
{
"description": "Chrome versions ant\u00e9rieures \u00e0 123.0.6312.86/.87 pour Windows et Mac",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-2887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2887"
},
{
"name": "CVE-2024-2883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2883"
},
{
"name": "CVE-2024-2886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2886"
},
{
"name": "CVE-2024-2885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2885"
}
],
"initial_release_date": "2024-03-27T00:00:00",
"last_revision_date": "2024-03-27T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0254",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 26 mars 2024",
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
}
]
}
gsd-2024-2885
Vulnerability from gsd
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-2885"
],
"details": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"id": "GSD-2024-2885",
"modified": "2024-04-03T05:02:25.876986Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2024-2885",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "123.0.6312.86",
"version_value": "123.0.6312.86"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
},
{
"name": "https://issues.chromium.org/issues/328958020",
"refsource": "MISC",
"url": "https://issues.chromium.org/issues/328958020"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"descriptions": [
{
"lang": "en",
"value": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "Use after free en Dawn en Google Chrome anterior a 123.0.6312.86 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)"
}
],
"id": "CVE-2024-2885",
"lastModified": "2024-03-29T04:15:09.077",
"metrics": {},
"published": "2024-03-26T21:15:53.220",
"references": [
{
"source": "chrome-cve-admin@google.com",
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://issues.chromium.org/issues/328958020"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Awaiting Analysis"
}
}
}
}
opensuse-su-2024:13953-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "chromedriver-124.0.6367.201-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the chromedriver-124.0.6367.201-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13953",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13953-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2625 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2626 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2626/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2627 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2628 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2883 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2883/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2887 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3156 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3157 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3158 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3159 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3515 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3515/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3516 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3832 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3832/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3833 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3834 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3837 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3838 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3839 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3840 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3841 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3841/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3843 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3844 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3844/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3845 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3846 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3846/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3847 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3847/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4058 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4059 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4060 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4331 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4368 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4558 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4559 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4671 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4671/"
}
],
"title": "chromedriver-124.0.6367.201-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13953-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-124.0.6367.201-1.1.aarch64",
"product": {
"name": "chromedriver-124.0.6367.201-1.1.aarch64",
"product_id": "chromedriver-124.0.6367.201-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-124.0.6367.201-1.1.aarch64",
"product": {
"name": "chromium-124.0.6367.201-1.1.aarch64",
"product_id": "chromium-124.0.6367.201-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-124.0.6367.201-1.1.ppc64le",
"product": {
"name": "chromedriver-124.0.6367.201-1.1.ppc64le",
"product_id": "chromedriver-124.0.6367.201-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "chromium-124.0.6367.201-1.1.ppc64le",
"product": {
"name": "chromium-124.0.6367.201-1.1.ppc64le",
"product_id": "chromium-124.0.6367.201-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-124.0.6367.201-1.1.s390x",
"product": {
"name": "chromedriver-124.0.6367.201-1.1.s390x",
"product_id": "chromedriver-124.0.6367.201-1.1.s390x"
}
},
{
"category": "product_version",
"name": "chromium-124.0.6367.201-1.1.s390x",
"product": {
"name": "chromium-124.0.6367.201-1.1.s390x",
"product_id": "chromium-124.0.6367.201-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-124.0.6367.201-1.1.x86_64",
"product": {
"name": "chromedriver-124.0.6367.201-1.1.x86_64",
"product_id": "chromedriver-124.0.6367.201-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-124.0.6367.201-1.1.x86_64",
"product": {
"name": "chromium-124.0.6367.201-1.1.x86_64",
"product_id": "chromium-124.0.6367.201-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-124.0.6367.201-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64"
},
"product_reference": "chromedriver-124.0.6367.201-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-124.0.6367.201-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le"
},
"product_reference": "chromedriver-124.0.6367.201-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-124.0.6367.201-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x"
},
"product_reference": "chromedriver-124.0.6367.201-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-124.0.6367.201-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64"
},
"product_reference": "chromedriver-124.0.6367.201-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-124.0.6367.201-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64"
},
"product_reference": "chromium-124.0.6367.201-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-124.0.6367.201-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le"
},
"product_reference": "chromium-124.0.6367.201-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-124.0.6367.201-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x"
},
"product_reference": "chromium-124.0.6367.201-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-124.0.6367.201-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
},
"product_reference": "chromium-124.0.6367.201-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2625"
}
],
"notes": [
{
"category": "general",
"text": "Object lifecycle issue in V8 in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2625",
"url": "https://www.suse.com/security/cve/CVE-2024-2625"
},
{
"category": "external",
"summary": "SUSE Bug 1221732 for CVE-2024-2625",
"url": "https://bugzilla.suse.com/1221732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-2625"
},
{
"cve": "CVE-2024-2626",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2626"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Swiftshader in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2626",
"url": "https://www.suse.com/security/cve/CVE-2024-2626"
},
{
"category": "external",
"summary": "SUSE Bug 1221732 for CVE-2024-2626",
"url": "https://bugzilla.suse.com/1221732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-2626"
},
{
"cve": "CVE-2024-2627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2627"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Canvas in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2627",
"url": "https://www.suse.com/security/cve/CVE-2024-2627"
},
{
"category": "external",
"summary": "SUSE Bug 1221732 for CVE-2024-2627",
"url": "https://bugzilla.suse.com/1221732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-2627"
},
{
"cve": "CVE-2024-2628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2628"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Downloads in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted URL. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2628",
"url": "https://www.suse.com/security/cve/CVE-2024-2628"
},
{
"category": "external",
"summary": "SUSE Bug 1221732 for CVE-2024-2628",
"url": "https://bugzilla.suse.com/1221732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-2628"
},
{
"cve": "CVE-2024-2883",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2883"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in ANGLE in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2883",
"url": "https://www.suse.com/security/cve/CVE-2024-2883"
},
{
"category": "external",
"summary": "SUSE Bug 1222035 for CVE-2024-2883",
"url": "https://bugzilla.suse.com/1222035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-2883"
},
{
"cve": "CVE-2024-2885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2885"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2885",
"url": "https://www.suse.com/security/cve/CVE-2024-2885"
},
{
"category": "external",
"summary": "SUSE Bug 1222035 for CVE-2024-2885",
"url": "https://bugzilla.suse.com/1222035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-2885"
},
{
"cve": "CVE-2024-2886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2886"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2886",
"url": "https://www.suse.com/security/cve/CVE-2024-2886"
},
{
"category": "external",
"summary": "SUSE Bug 1222035 for CVE-2024-2886",
"url": "https://bugzilla.suse.com/1222035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-2886"
},
{
"cve": "CVE-2024-2887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2887"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2887",
"url": "https://www.suse.com/security/cve/CVE-2024-2887"
},
{
"category": "external",
"summary": "SUSE Bug 1222035 for CVE-2024-2887",
"url": "https://bugzilla.suse.com/1222035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-2887"
},
{
"cve": "CVE-2024-3156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3156"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in V8 in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3156",
"url": "https://www.suse.com/security/cve/CVE-2024-3156"
},
{
"category": "external",
"summary": "SUSE Bug 1222260 for CVE-2024-3156",
"url": "https://bugzilla.suse.com/1222260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-3156"
},
{
"cve": "CVE-2024-3157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3157"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in Compositing in Google Chrome prior to 123.0.6312.122 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3157",
"url": "https://www.suse.com/security/cve/CVE-2024-3157"
},
{
"category": "external",
"summary": "SUSE Bug 1222707 for CVE-2024-3157",
"url": "https://bugzilla.suse.com/1222707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3157"
},
{
"cve": "CVE-2024-3158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3158"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Bookmarks in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3158",
"url": "https://www.suse.com/security/cve/CVE-2024-3158"
},
{
"category": "external",
"summary": "SUSE Bug 1222260 for CVE-2024-3158",
"url": "https://bugzilla.suse.com/1222260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-3158"
},
{
"cve": "CVE-2024-3159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3159"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in V8 in Google Chrome prior to 123.0.6312.105 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3159",
"url": "https://www.suse.com/security/cve/CVE-2024-3159"
},
{
"category": "external",
"summary": "SUSE Bug 1222260 for CVE-2024-3159",
"url": "https://bugzilla.suse.com/1222260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-3159"
},
{
"cve": "CVE-2024-3515",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3515"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Dawn in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3515",
"url": "https://www.suse.com/security/cve/CVE-2024-3515"
},
{
"category": "external",
"summary": "SUSE Bug 1222707 for CVE-2024-3515",
"url": "https://bugzilla.suse.com/1222707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3515"
},
{
"cve": "CVE-2024-3516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3516"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in ANGLE in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3516",
"url": "https://www.suse.com/security/cve/CVE-2024-3516"
},
{
"category": "external",
"summary": "SUSE Bug 1222707 for CVE-2024-3516",
"url": "https://bugzilla.suse.com/1222707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3516"
},
{
"cve": "CVE-2024-3832",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3832"
}
],
"notes": [
{
"category": "general",
"text": "Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3832",
"url": "https://www.suse.com/security/cve/CVE-2024-3832"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3832",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3832"
},
{
"cve": "CVE-2024-3833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3833"
}
],
"notes": [
{
"category": "general",
"text": "Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3833",
"url": "https://www.suse.com/security/cve/CVE-2024-3833"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3833",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3833"
},
{
"cve": "CVE-2024-3834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3834"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3834",
"url": "https://www.suse.com/security/cve/CVE-2024-3834"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3834",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3834"
},
{
"cve": "CVE-2024-3837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3837"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3837",
"url": "https://www.suse.com/security/cve/CVE-2024-3837"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3837",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3837"
},
{
"cve": "CVE-2024-3838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3838"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3838",
"url": "https://www.suse.com/security/cve/CVE-2024-3838"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3838",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3838"
},
{
"cve": "CVE-2024-3839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3839"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3839",
"url": "https://www.suse.com/security/cve/CVE-2024-3839"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3839",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3839"
},
{
"cve": "CVE-2024-3840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3840"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3840",
"url": "https://www.suse.com/security/cve/CVE-2024-3840"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3840",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3840"
},
{
"cve": "CVE-2024-3841",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3841"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in Browser Switcher in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to inject scripts or HTML into a privileged page via a malicious file. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3841",
"url": "https://www.suse.com/security/cve/CVE-2024-3841"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3841",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3841"
},
{
"cve": "CVE-2024-3843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3843"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3843",
"url": "https://www.suse.com/security/cve/CVE-2024-3843"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3843",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3843"
},
{
"cve": "CVE-2024-3844",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3844"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Extensions in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3844",
"url": "https://www.suse.com/security/cve/CVE-2024-3844"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3844",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3844"
},
{
"cve": "CVE-2024-3845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3845"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Networks in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass mixed content policy via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3845",
"url": "https://www.suse.com/security/cve/CVE-2024-3845"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3845",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3845"
},
{
"cve": "CVE-2024-3846",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3846"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Prompts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3846",
"url": "https://www.suse.com/security/cve/CVE-2024-3846"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3846",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3846"
},
{
"cve": "CVE-2024-3847",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3847"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in WebUI in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3847",
"url": "https://www.suse.com/security/cve/CVE-2024-3847"
},
{
"category": "external",
"summary": "SUSE Bug 1222958 for CVE-2024-3847",
"url": "https://bugzilla.suse.com/1222958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-3847"
},
{
"cve": "CVE-2024-4058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4058"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in ANGLE in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4058",
"url": "https://www.suse.com/security/cve/CVE-2024-4058"
},
{
"category": "external",
"summary": "SUSE Bug 1223845 for CVE-2024-4058",
"url": "https://bugzilla.suse.com/1223845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-4058"
},
{
"cve": "CVE-2024-4059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4059"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in V8 API in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to leak cross-site data via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4059",
"url": "https://www.suse.com/security/cve/CVE-2024-4059"
},
{
"category": "external",
"summary": "SUSE Bug 1223845 for CVE-2024-4059",
"url": "https://bugzilla.suse.com/1223845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-4059"
},
{
"cve": "CVE-2024-4060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4060"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Dawn in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4060",
"url": "https://www.suse.com/security/cve/CVE-2024-4060"
},
{
"category": "external",
"summary": "SUSE Bug 1223845 for CVE-2024-4060",
"url": "https://bugzilla.suse.com/1223845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-4060"
},
{
"cve": "CVE-2024-4331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4331"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Picture In Picture in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4331",
"url": "https://www.suse.com/security/cve/CVE-2024-4331"
},
{
"category": "external",
"summary": "SUSE Bug 1223846 for CVE-2024-4331",
"url": "https://bugzilla.suse.com/1223846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-4331"
},
{
"cve": "CVE-2024-4368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4368"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Dawn in Google Chrome prior to 124.0.6367.118 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4368",
"url": "https://www.suse.com/security/cve/CVE-2024-4368"
},
{
"category": "external",
"summary": "SUSE Bug 1223846 for CVE-2024-4368",
"url": "https://bugzilla.suse.com/1223846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-4368"
},
{
"cve": "CVE-2024-4558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4558"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4558",
"url": "https://www.suse.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "SUSE Bug 1224045 for CVE-2024-4558",
"url": "https://bugzilla.suse.com/1224045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-4558"
},
{
"cve": "CVE-2024-4559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4559"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in WebAudio in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4559",
"url": "https://www.suse.com/security/cve/CVE-2024-4559"
},
{
"category": "external",
"summary": "SUSE Bug 1224045 for CVE-2024-4559",
"url": "https://bugzilla.suse.com/1224045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-4559"
},
{
"cve": "CVE-2024-4671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4671"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4671",
"url": "https://www.suse.com/security/cve/CVE-2024-4671"
},
{
"category": "external",
"summary": "SUSE Bug 1224208 for CVE-2024-4671",
"url": "https://bugzilla.suse.com/1224208"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-124.0.6367.201-1.1.x86_64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.aarch64",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.s390x",
"openSUSE Tumbleweed:chromium-124.0.6367.201-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-4671"
}
]
}
opensuse-su-2024:0122-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for opera",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nOpera was updated to fix the following issues:\n\nUpdate to 109.0.5097.45\n\n * CHR-9416 Updating Chromium on desktop-stable-* branches\n * DNA-114737 [Search box] It\u0027s getting blurred when click\n on it, also lower corners are not rounded sometimes\n * DNA-115042 \u0027+\u0027 button is not responsive when 30+ tabs opened\n * DNA-115326 Wrong fonts and padding after intake\n * DNA-115392 [Badges] Text displayed in red\n * DNA-115501 \u0027Review your payment\u0027 native popup has wrong colors\n * DNA-115809 Enable #show-duplicate-indicator-on-link on\n all streams\n\nUpdate to 109.0.5097.38\n\n * CHR-9695 Update Chromium on desktop-stable-123-5097 to\n 123.0.6312.87\n * DNA-115156 [Login and Password suggestion] Suggestions are\n bolded and highlight doesn`t fill all area\n * DNA-115313 No video playback on skyshowtime.com\n * DNA-115639 [Version 109][Detached window] Missing functions\n names in light mode\n * DNA-115812 Enable #startpage-opening-animation on all streams\n * DNA-115836 Lucid mode visual issues on H264 videos\n- The update to chromium 109.0.5097.38 fixes following issues:\n CVE-2024-2883, CVE-2024-2885, CVE-2024-2886, CVE-2024-2887\n\nUpdate to 109.0.5097.33\n\n * CHR-9674 Update Chromium on desktop-stable-123-5097 to\n 123.0.6312.46\n * DNA-115357 [Settings] Search toolbar has wrong position\n * DNA-115396 Bolded camera icon when camera access is allowed\n * DNA-115478 AI Prompts in text highlight popup not displayed\n properly\n * DNA-115563 Wallet selector not working\n * DNA-115601 Remove \u0027moving text\u0027 animation in the tab cycler\n * DNA-115645 Internal pages icons unreadable when highlight\n * DNA-115717 \u0027Your extension was disabled because it is\n corrupted\u0027 message is displayed to user\n * DNA-115770 Promote 109 to stable\n- Complete Opera 109 changelog at:\n https://blogs.opera.com/desktop/changelog-for-109/\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2024-122",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0122-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:0122-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDYESS3DGR73AJ5JNOISN7IW6IOWRXSC/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:0122-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDYESS3DGR73AJ5JNOISN7IW6IOWRXSC/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2883 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2883/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2885 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-2887 page",
"url": "https://www.suse.com/security/cve/CVE-2024-2887/"
}
],
"title": "Security update for opera",
"tracking": {
"current_release_date": "2024-05-11T12:26:19Z",
"generator": {
"date": "2024-05-11T12:26:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:0122-1",
"initial_release_date": "2024-05-11T12:26:19Z",
"revision_history": [
{
"date": "2024-05-11T12:26:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "opera-109.0.5097.45-lp156.2.3.1.x86_64",
"product": {
"name": "opera-109.0.5097.45-lp156.2.3.1.x86_64",
"product_id": "opera-109.0.5097.45-lp156.2.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.6 NonFree",
"product": {
"name": "openSUSE Leap 15.6 NonFree",
"product_id": "openSUSE Leap 15.6 NonFree"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "opera-109.0.5097.45-lp156.2.3.1.x86_64 as component of openSUSE Leap 15.6 NonFree",
"product_id": "openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
},
"product_reference": "opera-109.0.5097.45-lp156.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6 NonFree"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-2883",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2883"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in ANGLE in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2883",
"url": "https://www.suse.com/security/cve/CVE-2024-2883"
},
{
"category": "external",
"summary": "SUSE Bug 1222035 for CVE-2024-2883",
"url": "https://bugzilla.suse.com/1222035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-11T12:26:19Z",
"details": "important"
}
],
"title": "CVE-2024-2883"
},
{
"cve": "CVE-2024-2885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2885"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2885",
"url": "https://www.suse.com/security/cve/CVE-2024-2885"
},
{
"category": "external",
"summary": "SUSE Bug 1222035 for CVE-2024-2885",
"url": "https://bugzilla.suse.com/1222035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-11T12:26:19Z",
"details": "important"
}
],
"title": "CVE-2024-2885"
},
{
"cve": "CVE-2024-2886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2886"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2886",
"url": "https://www.suse.com/security/cve/CVE-2024-2886"
},
{
"category": "external",
"summary": "SUSE Bug 1222035 for CVE-2024-2886",
"url": "https://bugzilla.suse.com/1222035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-11T12:26:19Z",
"details": "important"
}
],
"title": "CVE-2024-2886"
},
{
"cve": "CVE-2024-2887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-2887"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-2887",
"url": "https://www.suse.com/security/cve/CVE-2024-2887"
},
{
"category": "external",
"summary": "SUSE Bug 1222035 for CVE-2024-2887",
"url": "https://bugzilla.suse.com/1222035"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6 NonFree:opera-109.0.5097.45-lp156.2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-05-11T12:26:19Z",
"details": "important"
}
],
"title": "CVE-2024-2887"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.