A Dragos report observed 23 new ransomware groups targeting industrial organizations in Q3 2024
chromium-131.0.6778.204-1.el8
FEDORA-EPEL-2024-c27d1a40bc
Packages in this update:
chromium-131.0.6778.204-1.el8
Update description:
Update to 131.0.6778.204
High CVE-2024-12692: Type Confusion in V8
High CVE-2024-12693: Out of bounds memory access in V8
High CVE-2024-12694: Use after free in Compositing
High CVE-2024-12695: Out of bounds write in V8
chromium-131.0.6778.204-1.el10_0
FEDORA-EPEL-2024-b98ed0b39c
Packages in this update:
chromium-131.0.6778.204-1.el10_0
Update description:
Update to 131.0.6778.204
High CVE-2024-12692: Type Confusion in V8
High CVE-2024-12693: Out of bounds memory access in V8
High CVE-2024-12694: Use after free in Compositing
High CVE-2024-12695: Out of bounds write in V8
chromium-131.0.6778.204-1.fc41
FEDORA-2024-21c7531146
Packages in this update:
chromium-131.0.6778.204-1.fc41
Update description:
Update to 131.0.6778.204
High CVE-2024-12692: Type Confusion in V8
High CVE-2024-12693: Out of bounds memory access in V8
High CVE-2024-12694: Use after free in Compositing
High CVE-2024-12695: Out of bounds write in V8
chromium-131.0.6778.204-1.fc40
FEDORA-2024-4808dce926
Packages in this update:
chromium-131.0.6778.204-1.fc40
Update description:
Update to 131.0.6778.204
High CVE-2024-12692: Type Confusion in V8
High CVE-2024-12693: Out of bounds memory access in V8
High CVE-2024-12694: Use after free in Compositing
High CVE-2024-12695: Out of bounds write in V8
chromium-131.0.6778.204-1.el9
FEDORA-EPEL-2024-74ea1d7890
Packages in this update:
chromium-131.0.6778.204-1.el9
Update description:
Update to 131.0.6778.204
High CVE-2024-12692: Type Confusion in V8
High CVE-2024-12693: Out of bounds memory access in V8
High CVE-2024-12694: Use after free in Compositing
High CVE-2024-12695: Out of bounds write in V8
ZDI-24-1725: Webmin CGI Command Injection Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Webmin. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.9. The following CVEs are assigned: CVE-2024-12828.
ZDI-24-1726: Linux Kernel ksmbd TCP Connection Memory Exhaustion Denial-of-Service Vulnerability
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of the Linux Kernel. Authentication is not required to exploit this vulnerability. However, only systems with ksmbd enabled are vulnerable. The ZDI has assigned a CVSS rating of 5.9. The following CVEs are assigned: CVE-2024-50285.
ZDI-24-1721: Delta Electronics DTM Soft BIN File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DTM Soft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12677.
ZDI-24-1722: (0Day) Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-12834.