{"affected":[{"ecosystem_specific":{"binaries":[{"chromedriver":"128.0.6613.84-bp156.2.17.1","chromium":"128.0.6613.84-bp156.2.17.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP5","name":"chromium","purl":"pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"128.0.6613.84-bp156.2.17.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"chromedriver":"128.0.6613.84-bp156.2.17.1","chromium":"128.0.6613.84-bp156.2.17.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP6","name":"chromium","purl":"pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"128.0.6613.84-bp156.2.17.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"chromedriver":"128.0.6613.84-bp156.2.17.1","chromium":"128.0.6613.84-bp156.2.17.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"chromium","purl":"pkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"128.0.6613.84-bp156.2.17.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"chromedriver":"128.0.6613.84-bp156.2.17.1","chromium":"128.0.6613.84-bp156.2.17.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"chromium","purl":"pkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"128.0.6613.84-bp156.2.17.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for chromium fixes the following issues:\n\n- Chromium 128.0.6613.84 (boo#1229591)\n  * CVE-2024-7964: Use after free in Passwords\n  * CVE-2024-7965: Inappropriate implementation in V8\n  * CVE-2024-7966: Out of bounds memory access in Skia\n  * CVE-2024-7967: Heap buffer overflow in Fonts\n  * CVE-2024-7968: Use after free in Autofill\n  * CVE-2024-7969: Type Confusion in V8\n  * CVE-2024-7971: Type confusion in V8\n  * CVE-2024-7972: Inappropriate implementation in V8\n  * CVE-2024-7973: Heap buffer overflow in PDFium\n  * CVE-2024-7974: Insufficient data validation in V8 API\n  * CVE-2024-7975: Inappropriate implementation in Permissions\n  * CVE-2024-7976: Inappropriate implementation in FedCM\n  * CVE-2024-7977: Insufficient data validation in Installer\n  * CVE-2024-7978: Insufficient policy enforcement in Data Transfer\n  * CVE-2024-7979: Insufficient data validation in Installer\n  * CVE-2024-7980: Insufficient data validation in Installer\n  * CVE-2024-7981: Inappropriate implementation in Views\n  * CVE-2024-8033: Inappropriate implementation in WebApp Installs\n  * CVE-2024-8034: Inappropriate implementation in Custom Tabs\n  * CVE-2024-8035: Inappropriate implementation in Extensions\n  * Various fixes from internal audits, fuzzing and other initiatives\n","id":"openSUSE-SU-2024:0258-2","modified":"2024-08-23T09:15:52Z","published":"2024-08-23T09:15:52Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G5G3DFUIZH3E3T5UIPSI3LSGCI5KE3NF/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229426"},{"type":"REPORT","url":"https://bugzilla.suse.com/1229591"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7971"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7972"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7974"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7976"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7979"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-7981"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-8033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-8034"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-8035"}],"related":["CVE-2024-7964","CVE-2024-7965","CVE-2024-7966","CVE-2024-7967","CVE-2024-7968","CVE-2024-7969","CVE-2024-7971","CVE-2024-7972","CVE-2024-7973","CVE-2024-7974","CVE-2024-7975","CVE-2024-7976","CVE-2024-7977","CVE-2024-7978","CVE-2024-7979","CVE-2024-7980","CVE-2024-7981","CVE-2024-8033","CVE-2024-8034","CVE-2024-8035"],"summary":"Security update for chromium","upstream":["CVE-2024-7964","CVE-2024-7965","CVE-2024-7966","CVE-2024-7967","CVE-2024-7968","CVE-2024-7969","CVE-2024-7971","CVE-2024-7972","CVE-2024-7973","CVE-2024-7974","CVE-2024-7975","CVE-2024-7976","CVE-2024-7977","CVE-2024-7978","CVE-2024-7979","CVE-2024-7980","CVE-2024-7981","CVE-2024-8033","CVE-2024-8034","CVE-2024-8035"]}