Updated chromium-browser-stable packages fix security vulnerabilities
Publication date: 27 Apr 2024Modification date: 27 Apr 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2024-3832 , CVE-2024-3833 , CVE-2024-3914 , CVE-2024-3834 , CVE-2024-3837 , CVE-2024-3838 , CVE-2024-3839 , CVE-2024-3840 , CVE-2024-3841 , CVE-2024-3843 , CVE-2024-3844 , CVE-2024-3845 , CVE-2024-3846 , CVE-2024-3847 , CVE-2024-3157 , CVE-2024-3516 , CVE-2024-3515
Description
The chromium-browser-stable package has been updated to the 124.0.6367.60 release. It includes 23 security fixes. Please, do note, only x86_64 is supported from now on. i586 support for linux was stopped some years ago and the community is not able to provide patches anymore for the latest Chromium code. Some of the security fixes are: * High CVE-2024-3832: Object corruption in V8. Reported by Man Yue Mo of GitHub Security Lab on 2024-03-27 * High CVE-2024-3833: Object corruption in WebAssembly. Reported by Man Yue Mo of GitHub Security Lab on 2024-03-27 * High CVE-2024-3914: Use after free in V8. Reported by Seunghyun Lee (@0x10n) of KAIST Hacking Lab, via Pwn2Own 2024 on 2024-03-21 * High CVE-2024-3834: Use after free in Downloads. Reported by ChaobinZhang on 2024-02-24 * Medium CVE-2024-3837: Use after free in QUIC. Reported by {rotiple, dch3ck} of CW Research Inc. on 2024-01-15 * Medium CVE-2024-3838: Inappropriate implementation in Autofill. Reported by KiriminAja on 2024-03-06 * Medium CVE-2024-3839: Out of bounds read in Fonts. Reported by Ronald Crane (Zippenhop LLC) on 2024-01-16 * Medium CVE-2024-3840: Insufficient policy enforcement in Site Isolation. Reported by Ahmed ElMasry on 2024-01-22 * Medium CVE-2024-3841: Insufficient data validation in Browser Switcher. Reported by Oleg on 2024-03-19 * Medium CVE-2024-3843: Insufficient data validation in Downloads. Reported by Azur on 2023-12-24 * Low CVE-2024-3844: Inappropriate implementation in Extensions. Reported by Alesandro Ortiz on 2022-02-23 * Low CVE-2024-3845: Inappropriate implementation in Network. Reported by Daniel Baulig on 2024-02-03 * Low CVE-2024-3846: Inappropriate implementation in Prompts. Reported by Ahmed ElMasry on 2023-05-23 * Low CVE-2024-3847: Insufficient policy enforcement in WebUI. Reported by Yan Zhu on 2024-03-08 * High CVE-2024-3157: Out of bounds write in Compositing. Reported by DarkNavy on 2024-03-26 * High CVE-2024-3516: Heap buffer overflow in ANGLE. Reported by Bao (zx) Pham and Toan (suto) Pham of Qrious Secure on 2024-03-09 * High CVE-2024-3515: Use after free in Dawn. Reported by wgslfuzz on 2024-03-25
References
- https://bugs.mageia.org/show_bug.cgi?id=33137
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html
- https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3832
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3833
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3914
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3834
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3837
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3838
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3839
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3841
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3843
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3844
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3845
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3846
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3847
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3516
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3515
SRPMS
9/tainted
- chromium-browser-stable-124.0.6367.60-1.mga9.tainted