Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2022.0318
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2022-0318)
Zusammenfassung:The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0318 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0318 advisory.

Vulnerability Insight:
The chromium-browser-stable package has been updated to the new 105 branch
with the 105.0.5195.102 version, fixing many bugs and 25 vulnerabilities.

Google is aware of reports that an exploit for CVE-2022-3075 exists in the
wild. Some of the addressed CVE are listed below:

High CVE-2022-3075: Insufficient data validation in Mojo. Reported by
Anonymous on 2022-08-30

Critical CVE-2022-3038: Use after free in Network Service. Reported by
Sergei Glazunov of Google Project Zero on 2022-06-28

High CVE-2022-3039: Use after free in WebSQL. Reported by Nan
Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research
Institute on 2022-07-11

High CVE-2022-3040: Use after free in Layout. Reported by Anonymous on
2022-07-03

High CVE-2022-3041: Use after free in WebSQL. Reported by Ziling Chen and
Nan Wang(@eternalsakura13) of 360 Vulnerability Research Institute on
2022-07-20

High CVE-2022-3042: Use after free in PhoneHub. Reported by
koocola(@alo_cook) and Guang Gong of 360 Vulnerability Research Institute
on 2022-06-22

High CVE-2022-3043: Heap buffer overflow in Screen Capture. Reported by
@ginggilBesel on 2022-06-16

High CVE-2022-3044: Inappropriate implementation in Site Isolation.
Reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research on
2020-02-12

High CVE-2022-3045: Insufficient validation of untrusted input in V8.
Reported by Ben Noordhuis on 2022-06-26

High CVE-2022-3046: Use after free in Browser Tag. Reported by Rong Jian
of VRI on 2022-07-21

High CVE-2022-3071: Use after free in Tab Strip. Reported by @ginggilBesel
on 2022-06-06

Medium CVE-2022-3047: Insufficient policy enforcement in Extensions API.
Reported by Maurice Dauer on 2022-07-07

Medium CVE-2022-3048: Inappropriate implementation in Chrome OS
lockscreen. Reported by Andr.Ess on 2022-03-06

Medium CVE-2022-3049: Use after free in SplitScreen. Reported by
@ginggilBesel on 2022-04-17

Medium CVE-2022-3050: Heap buffer overflow in WebUI. Reported by Zhihua
Yao of KunLun Lab on 2022-06-17

Medium CVE-2022-3051: Heap buffer overflow in Exosphere. Reported by
@ginggilBesel on 2022-07-18

Medium CVE-2022-3052: Heap buffer overflow in Window Manager. Reported
by Khalil Zhani on 2022-07-21

Medium CVE-2022-3053: Inappropriate implementation in Pointer Lock.
Reported by Jesper van den Ende (Pelican Party Studios) on 2021-11-08

Medium CVE-2022-3054: Insufficient policy enforcement in DevTools.
Reported by Kuilin Li on 2022-01-24

Medium CVE-2022-3055: Use after free in Passwords. Reported by Weipeng
Jiang (@Krace) and Guang Gong of 360 Vulnerability Research Institute on
2022-08-11

Low CVE-2022-3056: Insufficient policy enforcement in Content Security
Policy. Reported by Anonymous on 2022-05-26

Low CVE-2022-3057: Inappropriate implementation in iframe Sandbox.
Reported by Gareth Heyes on 2022-06-16

Low CVE-2022-3058: Use after free in Sign-In Flow. Reported by raven at
KunLun lab on 2022-06-20

Affected Software/OS:
'chromium-browser-stable' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-3038
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
https://security.gentoo.org/glsa/202209-23
http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html
https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html
https://crbug.com/1340253
Common Vulnerability Exposure (CVE) ID: CVE-2022-3039
https://crbug.com/1343348
Common Vulnerability Exposure (CVE) ID: CVE-2022-3040
https://crbug.com/1341539
Common Vulnerability Exposure (CVE) ID: CVE-2022-3041
https://crbug.com/1345947
Common Vulnerability Exposure (CVE) ID: CVE-2022-3042
https://crbug.com/1338553
Common Vulnerability Exposure (CVE) ID: CVE-2022-3043
https://crbug.com/1336979
Common Vulnerability Exposure (CVE) ID: CVE-2022-3044
https://crbug.com/1051198
Common Vulnerability Exposure (CVE) ID: CVE-2022-3045
https://crbug.com/1339648
Common Vulnerability Exposure (CVE) ID: CVE-2022-3046
https://crbug.com/1346245
Common Vulnerability Exposure (CVE) ID: CVE-2022-3047
https://crbug.com/1342586
Common Vulnerability Exposure (CVE) ID: CVE-2022-3048
https://crbug.com/1303308
Common Vulnerability Exposure (CVE) ID: CVE-2022-3049
https://crbug.com/1316892
Common Vulnerability Exposure (CVE) ID: CVE-2022-3050
https://crbug.com/1337132
Common Vulnerability Exposure (CVE) ID: CVE-2022-3051
https://crbug.com/1345245
Common Vulnerability Exposure (CVE) ID: CVE-2022-3052
https://crbug.com/1346154
Common Vulnerability Exposure (CVE) ID: CVE-2022-3053
https://crbug.com/1267867
Common Vulnerability Exposure (CVE) ID: CVE-2022-3054
https://crbug.com/1290236
Common Vulnerability Exposure (CVE) ID: CVE-2022-3055
https://crbug.com/1351969
Common Vulnerability Exposure (CVE) ID: CVE-2022-3056
https://crbug.com/1329460
Common Vulnerability Exposure (CVE) ID: CVE-2022-3057
https://crbug.com/1336904
Common Vulnerability Exposure (CVE) ID: CVE-2022-3058
https://crbug.com/1337676
Common Vulnerability Exposure (CVE) ID: CVE-2022-3071
https://crbug.com/1333995
Common Vulnerability Exposure (CVE) ID: CVE-2022-3075
https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html
https://crbug.com/1358134
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.