Upstream information

CVE-2024-3838 at MITRE

Description

Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium)

Upstream Security Advisories:

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v3 Scores
  National Vulnerability Database
Base Score 5.5
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Attack Vector Local
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality Impact None
Integrity Impact High
Availability Impact None
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1222958 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 15.5 NonFree
  • opera >= 110.0.5130.23-lp155.3.45.1
Patchnames:
openSUSE-2024-128
openSUSE Leap 15.6 NonFree
  • opera >= 110.0.5130.64-lp156.2.6.1
Patchnames:
openSUSE-2024-156
openSUSE Tumbleweed
  • chromedriver >= 124.0.6367.201-1.1
  • chromium >= 124.0.6367.201-1.1
Patchnames:
openSUSE-Tumbleweed-2024-13953


SUSE Timeline for this CVE

CVE page created: Wed Apr 17 13:45:07 2024
CVE page last modified: Tue Sep 3 19:32:23 2024