CERT-In finds multiple bugs in Google Chrome OS, GitLab


New Delhi, Jul 2 (IANS): The Indian Computer Emergency Response Team (CERT-In), which comes under the Ministry of Electronics & Information Technology, has warned users of multiple vulnerabilities in Google Chrome OS and GitLab, which could allow an attacker to execute arbitrary code on the targeted system.

LTS channel for Google ChromeOS versions prior to 120.0.6099.315 is the affected software.

On the other hand, the affected software in GitLab include -- GitLab Community Edition (CE) versions prior to 17.1.1, 17.0.3 and 16.11.5 and GitLab Enterprise Edition (EE) versions prior to 17.1.1, 17.0.3 and 16.11.5.

"Multiple vulnerabilities have been reported in LTS channel for ChromeOS which could be exploited by an attacker to execute arbitrary code on the targeted system," said the CERT-In advisory.

As per the cyber agency, these vulnerabilities exist in Google Chrome OS due to Heap buffer overflow in WebRTC and Use after free in Media Session.

An attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted web page.

The vulnerabilities reported in GitLab exist in various components of GitLab community Edition (CE) and Enterprise Edition (EE).

Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, access sensitive information, cause cross-site scripting, bypass security restrictions and cause denial of service condition on the targeted system, according to the cyber agency.

CERT-In has suggested users apply appropriate security updates as recommended by the companies.

 

  

Top Stories


Leave a Comment

Title: CERT-In finds multiple bugs in Google Chrome OS, GitLab



You have 2000 characters left.

Disclaimer:

Please write your correct name and email address. Kindly do not post any personal, abusive, defamatory, infringing, obscene, indecent, discriminatory or unlawful or similar comments. Daijiworld.com will not be responsible for any defamatory message posted under this article.

Please note that sending false messages to insult, defame, intimidate, mislead or deceive people or to intentionally cause public disorder is punishable under law. It is obligatory on Daijiworld to provide the IP address and other details of senders of such comments, to the authority concerned upon request.

Hence, sending offensive comments using daijiworld will be purely at your own risk, and in no way will Daijiworld.com be held responsible.