![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2022.0419 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2022-0419) |
Resumen: | The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0419 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0419 advisory. Vulnerability Insight: The chromium-browser-stable package has been updated to the new 107 branch with the 107.0.5304.87 version, fixing many bugs and 15 vulnerabilities, together with 107.0.5304.68. Some of the security fixes are: High CVE-2022-3652: Type Confusion in V8. Reported by srodulv and ZNMchtss at S.S.L Team on 2022-09-30 High CVE-2022-3653: Heap buffer overflow in Vulkan. Reported by SeongHwan Park (SeHwa) on 2022-08-19 High CVE-2022-3654: Use after free in Layout. Reported by Sergei Glazunov of Google Project Zero on 2022-09-19 Medium CVE-2022-3655: Heap buffer overflow in Media Galleries. Reported by koocola(@alo_cook) and Guang Gong of 360 Vulnerability Research Institute on 2022-07-11 Medium CVE-2022-3656: Insufficient data validation in File System. Reported by Ron Masas, Imperva on 2022-07-18 Medium CVE-2022-3657: Use after free in Extensions. Reported by Omri Bushari, Talon Cyber Security on 2022-08-09 Medium CVE-2022-3658: Use after free in Feedback service on Chrome OS. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research Institute on 2022-08-14 Medium CVE-2022-3659: Use after free in Accessibility. Reported by @ginggilBesel on 2022-08-23 Medium CVE-2022-3660: Inappropriate implementation in Full screen mode. Reported by Irvan Kurniawan (sourc7) on 2022-05-20 Low CVE-2022-3661: Insufficient data validation in Extensions. Reported by Young Min Kim (@ylemkimon), CompSec Lab at Seoul National University on 2022-08-04 High CVE-2022-3723: Type Confusion in V8. Reported by Jan Vojtesek, Milanek, and Przemek Gmerek of Avast on 2022-10-25 Affected Software/OS: 'chromium-browser-stable' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-3652 https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html https://crbug.com/1369871 Common Vulnerability Exposure (CVE) ID: CVE-2022-3653 https://crbug.com/1354271 Common Vulnerability Exposure (CVE) ID: CVE-2022-3654 http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html https://crbug.com/1365330 Common Vulnerability Exposure (CVE) ID: CVE-2022-3655 https://crbug.com/1343384 Common Vulnerability Exposure (CVE) ID: CVE-2022-3656 https://crbug.com/1345275 Common Vulnerability Exposure (CVE) ID: CVE-2022-3657 https://crbug.com/1351177 Common Vulnerability Exposure (CVE) ID: CVE-2022-3658 https://crbug.com/1352817 Common Vulnerability Exposure (CVE) ID: CVE-2022-3659 https://crbug.com/1355560 Common Vulnerability Exposure (CVE) ID: CVE-2022-3660 https://crbug.com/1327505 Common Vulnerability Exposure (CVE) ID: CVE-2022-3661 https://crbug.com/1350111 Common Vulnerability Exposure (CVE) ID: CVE-2022-3723 https://security.gentoo.org/glsa/202305-10 https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_27.html https://crbug.com/1378239 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |