![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2022.0318 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2022-0318) |
Zusammenfassung: | The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0318 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0318 advisory. Vulnerability Insight: The chromium-browser-stable package has been updated to the new 105 branch with the 105.0.5195.102 version, fixing many bugs and 25 vulnerabilities. Google is aware of reports that an exploit for CVE-2022-3075 exists in the wild. Some of the addressed CVE are listed below: High CVE-2022-3075: Insufficient data validation in Mojo. Reported by Anonymous on 2022-08-30 Critical CVE-2022-3038: Use after free in Network Service. Reported by Sergei Glazunov of Google Project Zero on 2022-06-28 High CVE-2022-3039: Use after free in WebSQL. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research Institute on 2022-07-11 High CVE-2022-3040: Use after free in Layout. Reported by Anonymous on 2022-07-03 High CVE-2022-3041: Use after free in WebSQL. Reported by Ziling Chen and Nan Wang(@eternalsakura13) of 360 Vulnerability Research Institute on 2022-07-20 High CVE-2022-3042: Use after free in PhoneHub. Reported by koocola(@alo_cook) and Guang Gong of 360 Vulnerability Research Institute on 2022-06-22 High CVE-2022-3043: Heap buffer overflow in Screen Capture. Reported by @ginggilBesel on 2022-06-16 High CVE-2022-3044: Inappropriate implementation in Site Isolation. Reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research on 2020-02-12 High CVE-2022-3045: Insufficient validation of untrusted input in V8. Reported by Ben Noordhuis High CVE-2022-3046: Use after free in Browser Tag. Reported by Rong Jian of VRI on 2022-07-21 High CVE-2022-3071: Use after free in Tab Strip. Reported by @ginggilBesel on 2022-06-06 Medium CVE-2022-3047: Insufficient policy enforcement in Extensions API. Reported by Maurice Dauer on 2022-07-07 Medium CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen. Reported by Andr.Ess on 2022-03-06 Medium CVE-2022-3049: Use after free in SplitScreen. Reported by @ginggilBesel on 2022-04-17 Medium CVE-2022-3050: Heap buffer overflow in WebUI. Reported by Zhihua Yao of KunLun Lab on 2022-06-17 Medium CVE-2022-3051: Heap buffer overflow in Exosphere. Reported by @ginggilBesel on 2022-07-18 Medium CVE-2022-3052: Heap buffer overflow in Window Manager. Reported by Khalil Zhani on 2022-07-21 Medium CVE-2022-3053: Inappropriate implementation in Pointer Lock. Reported by Jesper van den Ende (Pelican Party Studios) on 2021-11-08 Medium CVE-2022-3054: Insufficient policy enforcement in DevTools. Reported by Kuilin Li on 2022-01-24 Medium CVE-2022-3055: Use after free in Passwords. Reported by Weipeng Jiang (@Krace) and Guang Gong of 360 Vulnerability Research Institute on 2022-08-11 Low CVE-2022-3056: Insufficient policy enforcement in Content Security Policy. Reported by Anonymous on 2022-05-26 Low CVE-2022-3057: Inappropriate implementation in iframe Sandbox. Reported by Gareth Heyes on 2022-06-16 Low CVE-2022-3058: Use after free in Sign-In Flow. Reported by raven at KunLun lab on 2022-06-20 Affected Software/OS: 'chromium-browser-stable' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-3038 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ https://security.gentoo.org/glsa/202209-23 http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html https://crbug.com/1340253 Common Vulnerability Exposure (CVE) ID: CVE-2022-3039 https://crbug.com/1343348 Common Vulnerability Exposure (CVE) ID: CVE-2022-3040 https://crbug.com/1341539 Common Vulnerability Exposure (CVE) ID: CVE-2022-3041 https://crbug.com/1345947 Common Vulnerability Exposure (CVE) ID: CVE-2022-3042 https://crbug.com/1338553 Common Vulnerability Exposure (CVE) ID: CVE-2022-3043 https://crbug.com/1336979 Common Vulnerability Exposure (CVE) ID: CVE-2022-3044 https://crbug.com/1051198 Common Vulnerability Exposure (CVE) ID: CVE-2022-3045 https://crbug.com/1339648 Common Vulnerability Exposure (CVE) ID: CVE-2022-3046 https://crbug.com/1346245 Common Vulnerability Exposure (CVE) ID: CVE-2022-3047 https://crbug.com/1342586 Common Vulnerability Exposure (CVE) ID: CVE-2022-3048 https://crbug.com/1303308 Common Vulnerability Exposure (CVE) ID: CVE-2022-3049 https://crbug.com/1316892 Common Vulnerability Exposure (CVE) ID: CVE-2022-3050 https://crbug.com/1337132 Common Vulnerability Exposure (CVE) ID: CVE-2022-3051 https://crbug.com/1345245 Common Vulnerability Exposure (CVE) ID: CVE-2022-3052 https://crbug.com/1346154 Common Vulnerability Exposure (CVE) ID: CVE-2022-3053 https://crbug.com/1267867 Common Vulnerability Exposure (CVE) ID: CVE-2022-3054 https://crbug.com/1290236 Common Vulnerability Exposure (CVE) ID: CVE-2022-3055 https://crbug.com/1351969 Common Vulnerability Exposure (CVE) ID: CVE-2022-3056 https://crbug.com/1329460 Common Vulnerability Exposure (CVE) ID: CVE-2022-3057 https://crbug.com/1336904 Common Vulnerability Exposure (CVE) ID: CVE-2022-3058 https://crbug.com/1337676 Common Vulnerability Exposure (CVE) ID: CVE-2022-3071 https://crbug.com/1333995 Common Vulnerability Exposure (CVE) ID: CVE-2022-3075 https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html https://crbug.com/1358134 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |