{"id":"MGASA-2023-0355","summary":"New chromium-browser-stable 120.0.6099.129 fixes bugs and vulnerabilities","details":"The chromium-browser-stable package has been updated to the\n120.0.6099.129 release, fixing bugs and 20 vulnerabilities, together\nwith 120.0.6099.109, 120.0.6099.71 and 120.0.6099.62; some of them are\nlisted below.\n High CVE-2023-6508: Use after free in Media Stream. Reported by Cassidy\nKim(@cassidy6564) on 2023-10-31\n High CVE-2023-6509: Use after free in Side Panel Search. Reported by\nKhalil Zhani on 2023-10-21\n Medium CVE-2023-6510: Use after free in Media Capture. Reported by\n[pwn2car] on 2023-09-08\n Low CVE-2023-6511: Inappropriate implementation in Autofill. Reported\nby Ahmed ElMasry on 2023-09-04\n Low CVE-2023-6512: Inappropriate implementation in Web Browser UI.\nReported by Om Apip on 2023-06-24\n High CVE-2023-6702: Type Confusion in V8. Reported by Zhiyi Zhang and\nZhunki from Codesafe Team of Legendsec at Qi'anxin Group on 2023-11-10\n High CVE-2023-6703: Use after free in Blink. Reported by Cassidy\nKim(@cassidy6564) on 2023-11-14\n High CVE-2023-6704: Use after free in libavif. Reported by Fudan\nUniversity on 2023-11-23\n High CVE-2023-6705: Use after free in WebRTC. Reported by Cassidy\nKim(@cassidy6564) on 2023-11-28\n High CVE-2023-6706: Use after free in FedCM. Reported by anonymous on\n2023-11-09\n Medium CVE-2023-6707: Use after free in CSS. Reported by @ginggilBesel\non 2023-11-21\n High CVE-2023-7024: Heap buffer overflow in WebRTC. Reported by Clément\nLecigne and Vlad Stolyarov of Google's Threat Analysis Group on\n2023-12-19\n Google is aware that an exploit for CVE-2023-7024 exists in the wild.\n","modified":"2026-01-31T14:23:18.177620Z","published":"2023-12-26T10:29:03Z","related":["CVE-2023-6508","CVE-2023-6509","CVE-2023-6510","CVE-2023-6511","CVE-2023-6512","CVE-2023-6702","CVE-2023-6703","CVE-2023-6704","CVE-2023-6705","CVE-2023-6706","CVE-2023-6707","CVE-2023-7024"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2023-0355.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=32612"},{"type":"REPORT","url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html"},{"type":"REPORT","url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html"},{"type":"REPORT","url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_6.html"},{"type":"REPORT","url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html"},{"type":"REPORT","url":"https://www.aboutchromebooks.com/news/heres-whats-in-the-now-available-google-chrome-120-release/"}],"affected":[{"package":{"name":"chromium-browser-stable","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/chromium-browser-stable?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"120.0.6099.129-2.mga9.tainted"}]}],"ecosystem_specific":{"section":"tainted"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2023-0355.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}