Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.851525 |
Kategorie: | SuSE Local Security Checks |
Titel: | openSUSE: Security Advisory for Chromium (openSUSE-SU-2017:0738-1) |
Zusammenfassung: | The remote host is missing an update for the 'Chromium'; package(s) announced via the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'Chromium' package(s) announced via the referenced advisory. Vulnerability Insight: Chromium was updated to 57.0.2987.98 to fix security issues and bugs. The following vulnerabilities were fixed (bsc#1028848): - CVE-2017-5030: Memory corruption in V8 - CVE-2017-5031: Use after free in ANGLE - CVE-2017-5032: Out of bounds write in PDFium - CVE-2017-5029: Integer overflow in libxslt - CVE-2017-5034: Use after free in PDFium - CVE-2017-5035: Incorrect security UI in Omnibox - CVE-2017-5036: Use after free in PDFium - CVE-2017-5037: Multiple out of bounds writes in ChunkDemuxer - CVE-2017-5039: Use after free in PDFium - CVE-2017-5040: Information disclosure in V8 - CVE-2017-5041: Address spoofing in Omnibox - CVE-2017-5033: Bypass of Content Security Policy in Blink - CVE-2017-5042: Incorrect handling of cookies in Cast - CVE-2017-5038: Use after free in GuestView - CVE-2017-5043: Use after free in GuestView - CVE-2017-5044: Heap overflow in Skia - CVE-2017-5045: Information disclosure in XSS Auditor - CVE-2017-5046: Information disclosure in Blink The following non-security changes are included: - Address broken rendering on non-intel cards Affected Software/OS: Chromium on openSUSE Leap 42.2, openSUSE Leap 42.1 Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-5029 BugTraq ID: 96767 http://www.securityfocus.com/bid/96767 Debian Security Information: DSA-3810 (Google Search) http://www.debian.org/security/2017/dsa-3810 RedHat Security Advisories: RHSA-2017:0499 http://rhn.redhat.com/errata/RHSA-2017-0499.html http://www.securitytracker.com/id/1038157 Common Vulnerability Exposure (CVE) ID: CVE-2017-5030 https://security.gentoo.org/glsa/201704-02 https://www.zerodayinitiative.com/advisories/ZDI-20-126/ Common Vulnerability Exposure (CVE) ID: CVE-2017-5031 BugTraq ID: 98326 http://www.securityfocus.com/bid/98326 Common Vulnerability Exposure (CVE) ID: CVE-2017-5032 Common Vulnerability Exposure (CVE) ID: CVE-2017-5033 https://twitter.com/Ma7h1as/status/907641276434063361 Common Vulnerability Exposure (CVE) ID: CVE-2017-5034 Common Vulnerability Exposure (CVE) ID: CVE-2017-5035 Common Vulnerability Exposure (CVE) ID: CVE-2017-5036 Common Vulnerability Exposure (CVE) ID: CVE-2017-5037 Common Vulnerability Exposure (CVE) ID: CVE-2017-5038 Common Vulnerability Exposure (CVE) ID: CVE-2017-5039 Common Vulnerability Exposure (CVE) ID: CVE-2017-5040 Common Vulnerability Exposure (CVE) ID: CVE-2017-5041 Common Vulnerability Exposure (CVE) ID: CVE-2017-5042 Common Vulnerability Exposure (CVE) ID: CVE-2017-5043 Common Vulnerability Exposure (CVE) ID: CVE-2017-5044 Common Vulnerability Exposure (CVE) ID: CVE-2017-5045 Common Vulnerability Exposure (CVE) ID: CVE-2017-5046 |
Copyright | Copyright (C) 2017 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |