Lucene search

K
openvasCopyright (C) 2024 Greenbone AGOPENVAS:13614125623119202497971021027345988
HistorySep 27, 2024 - 12:00 a.m.

Fedora: Security Advisory (FEDORA-2024-aaff7345b8)

2024-09-2700:00:00
Copyright (C) 2024 Greenbone AG
plugins.openvas.org
1
fedora
security advisory
fedora-2024-aaff7345b8
greenbone ag
cve-2023-7281
cve-2023-7282
cve-2024-7018
cve-2024-7019
cve-2024-7020
cve-2024-7022
cve-2024-7024
cve-2024-9120
cve-2024-9121
cve-2024-9122
cve-2024-9123
chromium
fc40
vendorfix
package
cvss
high
use after free
inappropriate implementation
type confusion
integer overflow

CVSS3

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

AI Score

9.2

Confidence

High

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.1.9.2024.97971021027345988");
  script_cve_id("CVE-2023-7281", "CVE-2023-7282", "CVE-2024-7018", "CVE-2024-7019", "CVE-2024-7020", "CVE-2024-7022", "CVE-2024-7024", "CVE-2024-9120", "CVE-2024-9121", "CVE-2024-9122", "CVE-2024-9123");
  script_tag(name:"creation_date", value:"2024-09-27 04:08:39 +0000 (Fri, 27 Sep 2024)");
  script_version("2024-09-27T05:05:23+0000");
  script_tag(name:"last_modification", value:"2024-09-27 05:05:23 +0000 (Fri, 27 Sep 2024)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");

  script_name("Fedora: Security Advisory (FEDORA-2024-aaff7345b8)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("Fedora Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/fedora", "ssh/login/rpms", re:"ssh/login/release=FC40");

  script_xref(name:"Advisory-ID", value:"FEDORA-2024-aaff7345b8");
  script_xref(name:"URL", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2024-aaff7345b8");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314362");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314363");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314365");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314366");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314367");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314368");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314369");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314370");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314371");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314372");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314375");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314376");
  script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=2314379");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'chromium' package(s) announced via the FEDORA-2024-aaff7345b8 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"Update to 129.0.6668.70

 * High CVE-2024-9120: Use after free in Dawn
 * High CVE-2024-9121: Inappropriate implementation in V8
 * High CVE-2024-9122: Type Confusion in V8
 * High CVE-2024-9123: Integer overflow in Skia");

  script_tag(name:"affected", value:"'chromium' package(s) on Fedora 40.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";
report = "";

if(release == "FC40") {

  if(!isnull(res = isrpmvuln(pkg:"chromedriver", rpm:"chromedriver~129.0.6668.70~1.fc40", rls:"FC40"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"chromium", rpm:"chromium~129.0.6668.70~1.fc40", rls:"FC40"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"chromium-common", rpm:"chromium-common~129.0.6668.70~1.fc40", rls:"FC40"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"chromium-headless", rpm:"chromium-headless~129.0.6668.70~1.fc40", rls:"FC40"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"chromium-qt5-ui", rpm:"chromium-qt5-ui~129.0.6668.70~1.fc40", rls:"FC40"))) {
    report += res;
  }

  if(!isnull(res = isrpmvuln(pkg:"chromium-qt6-ui", rpm:"chromium-qt6-ui~129.0.6668.70~1.fc40", rls:"FC40"))) {
    report += res;
  }

  if(report != "") {
    security_message(data:report);
  } else if(__pkg_match) {
    exit(99);
  }
  exit(0);
}

exit(0);

CVSS3

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

AI Score

9.2

Confidence

High