Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-4950 (GCVE-0-2024-4950)
Vulnerability from cvelistv5 – Published: 2024-05-15 20:42 – Updated: 2025-03-28 19:59- Inappropriate implementation
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "chrome",
"vendor": "google",
"versions": [
{
"lessThanOrEqual": "125.0.6422.60",
"status": "affected",
"version": "-",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-4950",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-21T04:01:02.262983Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-451",
"description": "CWE-451 User Interface (UI) Misrepresentation of Critical Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-28T19:59:23.443Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T20:55:10.307Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://issues.chromium.org/issues/40065403"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "125.0.6422.60",
"status": "affected",
"version": "125.0.6422.60",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Inappropriate implementation",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-10T17:07:03.674Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html"
},
{
"url": "https://issues.chromium.org/issues/40065403"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2024-4950",
"datePublished": "2024-05-15T20:42:34.902Z",
"dateReserved": "2024-05-15T15:27:55.558Z",
"dateUpdated": "2025-03-28T19:59:23.443Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-4950",
"date": "2026-05-13",
"epss": "0.00148",
"percentile": "0.34881"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"125.0.6422.60\", \"matchCriteriaId\": \"9EA6CD11-7561-41B3-B56A-B6D0F242EE50\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA277A6C-83EC-4536-9125-97B84C4FAF59\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)\"}, {\"lang\": \"es\", \"value\": \"La implementaci\\u00f3n inapropiada en Descargas en Google Chrome anterior a 125.0.6422.60 permiti\\u00f3 que un atacante remoto convenciera a un usuario de realizar gestos espec\\u00edficos de la interfaz de usuario para realizar una suplantaci\\u00f3n de la interfaz de usuario a trav\\u00e9s de una p\\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)\"}]",
"id": "CVE-2024-4950",
"lastModified": "2024-12-19T20:13:25.240",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.6}]}",
"published": "2024-05-15T21:15:09.493",
"references": "[{\"url\": \"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://issues.chromium.org/issues/40065403\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://issues.chromium.org/issues/40065403\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1021\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-4950\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2024-05-15T21:15:09.493\",\"lastModified\":\"2025-03-28T20:15:25.440\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n inapropiada en Descargas en Google Chrome anterior a 125.0.6422.60 permiti\u00f3 que un atacante remoto convenciera a un usuario de realizar gestos espec\u00edficos de la interfaz de usuario para realizar una suplantaci\u00f3n de la interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1021\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-451\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"125.0.6422.60\",\"matchCriteriaId\":\"9EA6CD11-7561-41B3-B56A-B6D0F242EE50\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA277A6C-83EC-4536-9125-97B84C4FAF59\"}]}]}],\"references\":[{\"url\":\"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://issues.chromium.org/issues/40065403\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://issues.chromium.org/issues/40065403\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://issues.chromium.org/issues/40065403\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:55:10.307Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-4950\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-21T04:01:02.262983Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:google:chrome:-:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"chrome\", \"versions\": [{\"status\": \"affected\", \"version\": \"-\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"125.0.6422.60\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-451\", \"description\": \"CWE-451 User Interface (UI) Misrepresentation of Critical Information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-16T18:03:14.570Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Google\", \"product\": \"Chrome\", \"versions\": [{\"status\": \"affected\", \"version\": \"125.0.6422.60\", \"lessThan\": \"125.0.6422.60\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html\"}, {\"url\": \"https://issues.chromium.org/issues/40065403\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Inappropriate implementation\"}]}], \"providerMetadata\": {\"orgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"shortName\": \"Chrome\", \"dateUpdated\": \"2024-06-10T17:07:03.674Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-4950\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-28T19:59:23.443Z\", \"dateReserved\": \"2024-05-15T15:27:55.558Z\", \"assignerOrgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"datePublished\": \"2024-05-15T20:42:34.902Z\", \"assignerShortName\": \"Chrome\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
WID-SEC-W-2024-1176
Vulnerability from csaf_certbund - Published: 2024-05-16 22:00 - Updated: 2024-05-16 22:00Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgemäßen Implementierung und einer anfälligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuführen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgemäßen Implementierung und einer anfälligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuführen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgemäßen Implementierung und einer anfälligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuführen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgemäßen Implementierung und einer anfälligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuführen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgemäßen Implementierung und einer anfälligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuführen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Edge ist ein Web Browser von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Microsoft Edge ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder vertrauliche Informationen offenlegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Android\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1176 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1176.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1176 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1176"
},
{
"category": "external",
"summary": "Release notes for Microsoft Edge Security Updates vom 2024-05-16",
"url": "https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#may-16-2024"
}
],
"source_lang": "en-US",
"title": "Microsoft Edge: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-05-16T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:09:08.628+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-1176",
"initial_release_date": "2024-05-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-05-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c124.0.2478.109",
"product": {
"name": "Microsoft Edge \u003c124.0.2478.109",
"product_id": "T034888"
}
}
],
"category": "product_name",
"name": "Edge"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-30056",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgem\u00e4\u00dfen Implementierung und einer anf\u00e4lligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"release_date": "2024-05-16T22:00:00.000+00:00",
"title": "CVE-2024-30056"
},
{
"cve": "CVE-2024-4947",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgem\u00e4\u00dfen Implementierung und einer anf\u00e4lligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"release_date": "2024-05-16T22:00:00.000+00:00",
"title": "CVE-2024-4947"
},
{
"cve": "CVE-2024-4948",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgem\u00e4\u00dfen Implementierung und einer anf\u00e4lligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"release_date": "2024-05-16T22:00:00.000+00:00",
"title": "CVE-2024-4948"
},
{
"cve": "CVE-2024-4949",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgem\u00e4\u00dfen Implementierung und einer anf\u00e4lligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"release_date": "2024-05-16T22:00:00.000+00:00",
"title": "CVE-2024-4949"
},
{
"cve": "CVE-2024-4950",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Microsoft Edge. Diese Fehler bestehen aufgrund aufgrund eines Use-after-free-, Typverwechslungs- einerunsachgem\u00e4\u00dfen Implementierung und einer anf\u00e4lligen URL. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"release_date": "2024-05-16T22:00:00.000+00:00",
"title": "CVE-2024-4950"
}
]
}
WID-SEC-W-2024-1158
Vulnerability from csaf_certbund - Published: 2024-05-15 22:00 - Updated: 2024-11-27 23:00In Google Chrome bestehen mehrere Schwachstellen. Diese Fehler bestehen in V8 und der Downloads-Komponente aufgrund eines Use-after-free-, Typverwechslungs- und eines unsachgemäßen Implementierungsproblems, was möglicherweise zu entfernter Codeausführung führen kann. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <125.0.6422.60
Google / Chrome
|
<125.0.6422.60 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Google Chrome <125.0.6422.61
Google / Chrome
|
<125.0.6422.61 | ||
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
In Google Chrome bestehen mehrere Schwachstellen. Diese Fehler bestehen in V8 und der Downloads-Komponente aufgrund eines Use-after-free-, Typverwechslungs- und eines unsachgemäßen Implementierungsproblems, was möglicherweise zu entfernter Codeausführung führen kann. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <125.0.6422.60
Google / Chrome
|
<125.0.6422.60 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Google Chrome <125.0.6422.61
Google / Chrome
|
<125.0.6422.61 | ||
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
In Google Chrome bestehen mehrere Schwachstellen. Diese Fehler bestehen in V8 und der Downloads-Komponente aufgrund eines Use-after-free-, Typverwechslungs- und eines unsachgemäßen Implementierungsproblems, was möglicherweise zu entfernter Codeausführung führen kann. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <125.0.6422.60
Google / Chrome
|
<125.0.6422.60 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Google Chrome <125.0.6422.61
Google / Chrome
|
<125.0.6422.61 | ||
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
In Google Chrome bestehen mehrere Schwachstellen. Diese Fehler bestehen in V8 und der Downloads-Komponente aufgrund eines Use-after-free-, Typverwechslungs- und eines unsachgemäßen Implementierungsproblems, was möglicherweise zu entfernter Codeausführung führen kann. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <125.0.6422.60
Google / Chrome
|
<125.0.6422.60 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
IGEL OS
IGEL
|
cpe:/o:igel:os:-
|
— | |
|
Google Chrome <125.0.6422.61
Google / Chrome
|
<125.0.6422.61 | ||
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Chrome ist ein Internet-Browser von Google.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Chrome ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1158 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1158.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1158 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1158"
},
{
"category": "external",
"summary": "Stable Channel Update for Desktop Chrome Releases vom 2024-05-15",
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C01C1F5F82 vom 2024-05-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c01c1f5f82"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-382A7DBA53 vom 2024-05-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-382a7dba53"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-3A548F46A8 vom 2024-05-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-3a548f46a8"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-38D250BAFC vom 2024-05-17",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-38d250bafc"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-1FB3CEC2E0 vom 2024-05-17",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-1fb3cec2e0"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-07403BA3A8 vom 2024-05-20",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-07403ba3a8"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5694 vom 2024-05-17",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00104.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-3184C14A07 vom 2024-05-23",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-3184c14a07"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-1A95B76E46 vom 2024-05-23",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-1a95b76e46"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2024-46D6266EF3 vom 2024-05-23",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-46d6266ef3"
},
{
"category": "external",
"summary": "IGEL Security Advisory vom 2024-06-18",
"url": "https://kb.igel.com/securitysafety/en/isn-2024-14-chromium-vulnerabilities-129827213.html"
}
],
"source_lang": "en-US",
"title": "Google Chrome: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T12:09:01.926+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-1158",
"initial_release_date": "2024-05-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-05-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-05-16T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-05-20T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Fedora und Debian aufgenommen"
},
{
"date": "2024-05-23T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-06-17T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von IGEL aufgenommen"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "6",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c125.0.6422.60",
"product": {
"name": "Google Chrome \u003c125.0.6422.60",
"product_id": "T034844"
}
},
{
"category": "product_version",
"name": "125.0.6422.60",
"product": {
"name": "Google Chrome 125.0.6422.60",
"product_id": "T034844-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:125.0.6422.60"
}
}
},
{
"category": "product_version_range",
"name": "\u003c125.0.6422.61",
"product": {
"name": "Google Chrome \u003c125.0.6422.61",
"product_id": "T034845"
}
},
{
"category": "product_version",
"name": "125.0.6422.61",
"product": {
"name": "Google Chrome 125.0.6422.61",
"product_id": "T034845-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:125.0.6422.61"
}
}
}
],
"category": "product_name",
"name": "Chrome"
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "IGEL OS",
"product": {
"name": "IGEL OS",
"product_id": "T017865",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:-"
}
}
}
],
"category": "vendor",
"name": "IGEL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4947",
"notes": [
{
"category": "description",
"text": "In Google Chrome bestehen mehrere Schwachstellen. Diese Fehler bestehen in V8 und der Downloads-Komponente aufgrund eines Use-after-free-, Typverwechslungs- und eines unsachgem\u00e4\u00dfen Implementierungsproblems, was m\u00f6glicherweise zu entfernter Codeausf\u00fchrung f\u00fchren kann. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T034844",
"2951",
"T017865",
"T034845",
"74185"
]
},
"release_date": "2024-05-15T22:00:00.000+00:00",
"title": "CVE-2024-4947"
},
{
"cve": "CVE-2024-4948",
"notes": [
{
"category": "description",
"text": "In Google Chrome bestehen mehrere Schwachstellen. Diese Fehler bestehen in V8 und der Downloads-Komponente aufgrund eines Use-after-free-, Typverwechslungs- und eines unsachgem\u00e4\u00dfen Implementierungsproblems, was m\u00f6glicherweise zu entfernter Codeausf\u00fchrung f\u00fchren kann. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T034844",
"2951",
"T017865",
"T034845",
"74185"
]
},
"release_date": "2024-05-15T22:00:00.000+00:00",
"title": "CVE-2024-4948"
},
{
"cve": "CVE-2024-4949",
"notes": [
{
"category": "description",
"text": "In Google Chrome bestehen mehrere Schwachstellen. Diese Fehler bestehen in V8 und der Downloads-Komponente aufgrund eines Use-after-free-, Typverwechslungs- und eines unsachgem\u00e4\u00dfen Implementierungsproblems, was m\u00f6glicherweise zu entfernter Codeausf\u00fchrung f\u00fchren kann. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T034844",
"2951",
"T017865",
"T034845",
"74185"
]
},
"release_date": "2024-05-15T22:00:00.000+00:00",
"title": "CVE-2024-4949"
},
{
"cve": "CVE-2024-4950",
"notes": [
{
"category": "description",
"text": "In Google Chrome bestehen mehrere Schwachstellen. Diese Fehler bestehen in V8 und der Downloads-Komponente aufgrund eines Use-after-free-, Typverwechslungs- und eines unsachgem\u00e4\u00dfen Implementierungsproblems, was m\u00f6glicherweise zu entfernter Codeausf\u00fchrung f\u00fchren kann. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T034844",
"2951",
"T017865",
"T034845",
"74185"
]
},
"release_date": "2024-05-15T22:00:00.000+00:00",
"title": "CVE-2024-4950"
}
]
}
CERTFR-2024-AVI-0417
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.
Google indique que la vulnérabilité CVE-2024-4947 est activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 124.0.2478.109",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-4950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4950"
},
{
"name": "CVE-2024-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4947"
},
{
"name": "CVE-2024-4948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4948"
},
{
"name": "CVE-2024-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4949"
},
{
"name": "CVE-2024-30056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30056"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0417",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Edge\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un probl\u00e8me\nde s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2024-4947 est activement\nexploit\u00e9e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-30056",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30056"
},
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-4949",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4949"
},
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-4950",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4950"
},
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-4947",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4947"
},
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-4948",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4948"
}
]
}
CERTFR-2024-AVI-0410
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Google indique que la vulnérabilité CVE-2024-4947 est activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 125.0.6422.60 pour Linux",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
},
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 125.0.6422.60/.61 pour Windows et Mac",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-4950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4950"
},
{
"name": "CVE-2024-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4947"
},
{
"name": "CVE-2024-4948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4948"
},
{
"name": "CVE-2024-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4949"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0410",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2024-4947 est activement\nexploit\u00e9e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome du 15 mai 2024",
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html"
}
]
}
CERTFR-2024-AVI-0417
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.
Google indique que la vulnérabilité CVE-2024-4947 est activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 124.0.2478.109",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-4950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4950"
},
{
"name": "CVE-2024-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4947"
},
{
"name": "CVE-2024-4948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4948"
},
{
"name": "CVE-2024-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4949"
},
{
"name": "CVE-2024-30056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30056"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0417",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Edge\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un probl\u00e8me\nde s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2024-4947 est activement\nexploit\u00e9e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-30056",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30056"
},
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-4949",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4949"
},
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-4950",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4950"
},
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-4947",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4947"
},
{
"published_at": "2024-05-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2024-4948",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-4948"
}
]
}
CERTFR-2024-AVI-0410
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Google indique que la vulnérabilité CVE-2024-4947 est activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 125.0.6422.60 pour Linux",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
},
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 125.0.6422.60/.61 pour Windows et Mac",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-4950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4950"
},
{
"name": "CVE-2024-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4947"
},
{
"name": "CVE-2024-4948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4948"
},
{
"name": "CVE-2024-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4949"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0410",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n\nGoogle indique que la vuln\u00e9rabilit\u00e9 CVE-2024-4947 est activement\nexploit\u00e9e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome du 15 mai 2024",
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html"
}
]
}
OPENSUSE-SU-2024:13982-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "chromedriver-125.0.6422.60-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the chromedriver-125.0.6422.60-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13982",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13982-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4947 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4948 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4949 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4949/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4950 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4950/"
}
],
"title": "chromedriver-125.0.6422.60-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13982-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-125.0.6422.60-1.1.aarch64",
"product": {
"name": "chromedriver-125.0.6422.60-1.1.aarch64",
"product_id": "chromedriver-125.0.6422.60-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-125.0.6422.60-1.1.aarch64",
"product": {
"name": "chromium-125.0.6422.60-1.1.aarch64",
"product_id": "chromium-125.0.6422.60-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-125.0.6422.60-1.1.ppc64le",
"product": {
"name": "chromedriver-125.0.6422.60-1.1.ppc64le",
"product_id": "chromedriver-125.0.6422.60-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "chromium-125.0.6422.60-1.1.ppc64le",
"product": {
"name": "chromium-125.0.6422.60-1.1.ppc64le",
"product_id": "chromium-125.0.6422.60-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-125.0.6422.60-1.1.s390x",
"product": {
"name": "chromedriver-125.0.6422.60-1.1.s390x",
"product_id": "chromedriver-125.0.6422.60-1.1.s390x"
}
},
{
"category": "product_version",
"name": "chromium-125.0.6422.60-1.1.s390x",
"product": {
"name": "chromium-125.0.6422.60-1.1.s390x",
"product_id": "chromium-125.0.6422.60-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-125.0.6422.60-1.1.x86_64",
"product": {
"name": "chromedriver-125.0.6422.60-1.1.x86_64",
"product_id": "chromedriver-125.0.6422.60-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-125.0.6422.60-1.1.x86_64",
"product": {
"name": "chromium-125.0.6422.60-1.1.x86_64",
"product_id": "chromium-125.0.6422.60-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-125.0.6422.60-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64"
},
"product_reference": "chromedriver-125.0.6422.60-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-125.0.6422.60-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le"
},
"product_reference": "chromedriver-125.0.6422.60-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-125.0.6422.60-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x"
},
"product_reference": "chromedriver-125.0.6422.60-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-125.0.6422.60-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64"
},
"product_reference": "chromedriver-125.0.6422.60-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-125.0.6422.60-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64"
},
"product_reference": "chromium-125.0.6422.60-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-125.0.6422.60-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le"
},
"product_reference": "chromium-125.0.6422.60-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-125.0.6422.60-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x"
},
"product_reference": "chromium-125.0.6422.60-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-125.0.6422.60-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
},
"product_reference": "chromium-125.0.6422.60-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4947"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4947",
"url": "https://www.suse.com/security/cve/CVE-2024-4947"
},
{
"category": "external",
"summary": "SUSE Bug 1224341 for CVE-2024-4947",
"url": "https://bugzilla.suse.com/1224341"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-4947"
},
{
"cve": "CVE-2024-4948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4948"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4948",
"url": "https://www.suse.com/security/cve/CVE-2024-4948"
},
{
"category": "external",
"summary": "SUSE Bug 1224341 for CVE-2024-4948",
"url": "https://bugzilla.suse.com/1224341"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-4948"
},
{
"cve": "CVE-2024-4949",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4949"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4949",
"url": "https://www.suse.com/security/cve/CVE-2024-4949"
},
{
"category": "external",
"summary": "SUSE Bug 1224341 for CVE-2024-4949",
"url": "https://bugzilla.suse.com/1224341"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-4949"
},
{
"cve": "CVE-2024-4950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4950"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4950",
"url": "https://www.suse.com/security/cve/CVE-2024-4950"
},
{
"category": "external",
"summary": "SUSE Bug 1224341 for CVE-2024-4950",
"url": "https://bugzilla.suse.com/1224341"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-125.0.6422.60-1.1.x86_64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.aarch64",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.s390x",
"openSUSE Tumbleweed:chromium-125.0.6422.60-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2024-4950"
}
]
}
NCSC-2024-0221
Vulnerability from csaf_ncscnl - Published: 2024-05-16 12:42 - Updated: 2024-05-16 12:42| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
chrome
google
|
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
chrome
google
|
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
chrome
google
|
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
chrome
google
|
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
|
— |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Google heeft kwetsbaarheden verholpen in Chrome.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om willekeurige code uit te voeren met rechten van het slachtoffer, of om toegang te krijgen tot gevoelige gegevens in de context van de browser.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Van de kwetsbaarheid met kenmerk CVE-2024-4947 geeft Google aan informatie te hebben dat exploitcode gedeeld wordt. Deze exploitcode is (nog) niet publiek beschikbaar, maar het is aannemelijk dat de kwetsbaarheid beperkt en gericht wordt misbruikt.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Google heeft updates uitgebracht om de kwetsbaarheden te verhelpen in Chrome 125.0.6422.60 en 125.0.6422.61. Zie bijgevoegde referenties voor meer informatie:\n\nhttps://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Restriction of Rendered UI Layers or Frames",
"title": "CWE-1021"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - chrome",
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html"
}
],
"title": "Kwetsbaarheden verholpen in Google Chrome",
"tracking": {
"current_release_date": "2024-05-16T12:42:36.777137Z",
"id": "NCSC-2024-0221",
"initial_release_date": "2024-05-16T12:42:36.777137Z",
"revision_history": [
{
"date": "2024-05-16T12:42:36.777137Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "chromium",
"product": {
"name": "chromium",
"product_id": "CSAFPID-351827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:chromium_project:chromium:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "chromium_project"
},
{
"branches": [
{
"category": "product_name",
"name": "chrome",
"product": {
"name": "chrome",
"product_id": "CSAFPID-2738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "google"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4947",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2738"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4947",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4947.json"
}
],
"title": "CVE-2024-4947"
},
{
"cve": "CVE-2024-4948",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2738"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4948",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4948.json"
}
],
"title": "CVE-2024-4948"
},
{
"cve": "CVE-2024-4949",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2738"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4949",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4949.json"
}
],
"title": "CVE-2024-4949"
},
{
"cve": "CVE-2024-4950",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Rendered UI Layers or Frames",
"title": "CWE-1021"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2738"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4950",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4950.json"
}
],
"title": "CVE-2024-4950"
}
]
}
GHSA-H2PJ-PF6W-85P2
Vulnerability from github – Published: 2024-05-15 21:31 – Updated: 2024-07-03 18:42Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
{
"affected": [],
"aliases": [
"CVE-2024-4950"
],
"database_specific": {
"cwe_ids": [
"CWE-1021",
"CWE-451"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-05-15T21:15:09Z",
"severity": "MODERATE"
},
"details": "Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)",
"id": "GHSA-h2pj-pf6w-85p2",
"modified": "2024-07-03T18:42:04Z",
"published": "2024-05-15T21:31:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4950"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html"
},
{
"type": "WEB",
"url": "https://issues.chromium.org/issues/40065403"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2024-4950
Vulnerability from fkie_nvd - Published: 2024-05-15 21:15 - Updated: 2025-03-28 20:155.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| fedoraproject | fedora | 38 | |
| fedoraproject | fedora | 39 | |
| fedoraproject | fedora | 40 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA6CD11-7561-41B3-B56A-B6D0F242EE50",
"versionEndExcluding": "125.0.6422.60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
},
{
"lang": "es",
"value": "La implementaci\u00f3n inapropiada en Descargas en Google Chrome anterior a 125.0.6422.60 permiti\u00f3 que un atacante remoto convenciera a un usuario de realizar gestos espec\u00edficos de la interfaz de usuario para realizar una suplantaci\u00f3n de la interfaz de usuario a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: baja)"
}
],
"id": "CVE-2024-4950",
"lastModified": "2025-03-28T20:15:25.440",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-05-15T21:15:09.493",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://issues.chromium.org/issues/40065403"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://issues.chromium.org/issues/40065403"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-451"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
BDU:2024-03960
Vulnerability from fstec - Published: 15.05.2024{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO1297, TO1298, TO1299, TO1300",
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO1297 \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Google Chrome Enterprise, TO1298 \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Google Chrome, TO1299 \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Google Chrome, TO1300 \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Google Chrome",
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Google Inc, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\"",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), \u0434\u043e 125.0.6422.60 (Google Chrome), \u0434\u043e 2.11 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\n\u0414\u043b\u044f Google Chrome:\nhttps://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2024-4950\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (2.11):\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 126.0.6478.126+repack-1~deb12u1.osnova1\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 chromium \u0434\u043e 1:126.0.6478.126-0astragost0+ci202407031048+astra8 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2024-0830SE17\n\n\u0414\u043b\u044f Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb::\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 chromium \u0434\u043e 1:126.0.6478.182-0astragost0+ci202407301048+astra6 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20241017SE16\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7 \u0434\u043b\u044f \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b ARM:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 chromium \u0434\u043e 1:129.0.6668.100-0astragost0+ci202410111611+astra8+ci2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.05.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "27.12.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.05.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-03960",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-4950",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Google Chrome, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux - , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Microsoft Corp Windows - , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Apple Inc. MacOS - , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.11 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Downloads (\u0417\u0430\u0433\u0440\u0443\u0437\u043a\u0438) \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0430\u0442\u0430\u043a\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0432\u0438\u0437\u0443\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0441\u043b\u043e\u0435\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 (CWE-1021)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Downloads (\u0417\u0430\u0433\u0440\u0443\u0437\u043a\u0438) \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435\u043c \u0432\u0438\u0437\u0443\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u043b\u043e\u0435\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0430\u0442\u0430\u043a\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html\nhttps://issues.chromium.org/issues/40065403\nhttps://security-tracker.debian.org/tracker/CVE-2024-4950\nhttp://repo.red-soft.ru/redos/7.3c/x86_64/updates/\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.11/\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2024-0830SE17\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20241017SE16\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-1021",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,3)"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.