FEDORA-EPEL-2024-ae22e0853d
Packages in this update:
chromium-122.0.6261.94-1.el8
Update description:
Upstream security release 122.0.6261.94
High CVE-2024-1938: Type Confusion in V8
High CVE-2024-1939: Type Confusion in V8
chromium-122.0.6261.94-1.el8
Upstream security release 122.0.6261.94
High CVE-2024-1938: Type Confusion in V8
High CVE-2024-1939: Type Confusion in V8
chromium-122.0.6261.94-1.el7
Upstream security release 122.0.6261.94
High CVE-2024-1938: Type Confusion in V8
High CVE-2024-1939: Type Confusion in V8
Update to 122.0.6261.69
chromium-122.0.6261.94-1.fc38
upstream security release 122.0.6261.94
High CVE-2024-1938: Type Confusion in V8
High CVE-2024-1939: Type Confusion in V8
chromium-122.0.6261.94-1.fc40
upstream security release 122.0.6261.94
High CVE-2024-1938: Type Confusion in V8
High CVE-2024-1939: Type Confusion in V8
chromium-122.0.6261.94-1.fc39
upstream security release 122.0.6261.94
High CVE-2024-1938: Type Confusion in V8
High CVE-2024-1939: Type Confusion in V8
This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Security Event Manager. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-0692.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable. The ZDI has assigned a CVSS rating of 9.0. The following CVEs are assigned: CVE-2023-52440.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability. However, only systems with ksmbd enabled are vulnerable. The ZDI has assigned a CVSS rating of 8.6. The following CVEs are assigned: CVE-2023-52441.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable. The ZDI has assigned a CVSS rating of 9.3. The following CVEs are assigned: CVE-2023-52442.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-27346.