Bug ID 1225690
Summary VUL-0: chromium,ungoogled-chromium: multiple vulnerabilities fixed in 125.0.6422.141
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.5
Hardware Other
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee security-team@suse.de
Reporter andrea.mattiazzo@suse.com
QA Contact qa-bugs@suse.de
Target Milestone ---
Found By ---
Blocker ---

The Stable channel has been updated to 125.0.6422.141/.142 for Windows, Mac and
125.0.6422.141 for Linux which will roll out over the coming days/weeks. A full
list of changes in this build is available in the Log.

Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority
of users are updated with a fix. We will also retain restrictions if the bug
exists in a third party library that other projects similarly depend on, but
haven’t yet fixed.


This update includes 11 security fixes. Below, we highlight fixes that were
contributed by external researchers. Please see the Chrome Security Page for
more information.


- CVE-2024-5493: Heap buffer overflow in WebRTC.
- CVE-2024-5494: Use after free in Dawn.
- CVE-2024-5495: Use after free in Dawn.
- CVE-2024-5496: Use after free in Media Session.
- CVE-2024-5497: Out of bounds memory access in Keyboard Inputs.
- CVE-2024-5498: Use after free in Presentation API.
- CVE-2024-5499: Out of bounds write in Streams API.

As usual, our ongoing internal security work was responsible for a wide range
of fixes:

[343518382] Various fixes from internal audits, fuzzing and other initiatives

Many of our security bugs are detected using AddressSanitizer, MemorySanitizer,
UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.

[0]
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html


You are receiving this mail because: