![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2022.0318 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2022-0318) |
Summary: | The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0318 advisory. |
Description: | Summary: The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0318 advisory. Vulnerability Insight: The chromium-browser-stable package has been updated to the new 105 branch with the 105.0.5195.102 version, fixing many bugs and 25 vulnerabilities. Google is aware of reports that an exploit for CVE-2022-3075 exists in the wild. Some of the addressed CVE are listed below: High CVE-2022-3075: Insufficient data validation in Mojo. Reported by Anonymous on 2022-08-30 Critical CVE-2022-3038: Use after free in Network Service. Reported by Sergei Glazunov of Google Project Zero on 2022-06-28 High CVE-2022-3039: Use after free in WebSQL. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research Institute on 2022-07-11 High CVE-2022-3040: Use after free in Layout. Reported by Anonymous on 2022-07-03 High CVE-2022-3041: Use after free in WebSQL. Reported by Ziling Chen and Nan Wang(@eternalsakura13) of 360 Vulnerability Research Institute on 2022-07-20 High CVE-2022-3042: Use after free in PhoneHub. Reported by koocola(@alo_cook) and Guang Gong of 360 Vulnerability Research Institute on 2022-06-22 High CVE-2022-3043: Heap buffer overflow in Screen Capture. Reported by @ginggilBesel on 2022-06-16 High CVE-2022-3044: Inappropriate implementation in Site Isolation. Reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research on 2020-02-12 High CVE-2022-3045: Insufficient validation of untrusted input in V8. Reported by Ben Noordhuis High CVE-2022-3046: Use after free in Browser Tag. Reported by Rong Jian of VRI on 2022-07-21 High CVE-2022-3071: Use after free in Tab Strip. Reported by @ginggilBesel on 2022-06-06 Medium CVE-2022-3047: Insufficient policy enforcement in Extensions API. Reported by Maurice Dauer on 2022-07-07 Medium CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen. Reported by Andr.Ess on 2022-03-06 Medium CVE-2022-3049: Use after free in SplitScreen. Reported by @ginggilBesel on 2022-04-17 Medium CVE-2022-3050: Heap buffer overflow in WebUI. Reported by Zhihua Yao of KunLun Lab on 2022-06-17 Medium CVE-2022-3051: Heap buffer overflow in Exosphere. Reported by @ginggilBesel on 2022-07-18 Medium CVE-2022-3052: Heap buffer overflow in Window Manager. Reported by Khalil Zhani on 2022-07-21 Medium CVE-2022-3053: Inappropriate implementation in Pointer Lock. Reported by Jesper van den Ende (Pelican Party Studios) on 2021-11-08 Medium CVE-2022-3054: Insufficient policy enforcement in DevTools. Reported by Kuilin Li on 2022-01-24 Medium CVE-2022-3055: Use after free in Passwords. Reported by Weipeng Jiang (@Krace) and Guang Gong of 360 Vulnerability Research Institute on 2022-08-11 Low CVE-2022-3056: Insufficient policy enforcement in Content Security Policy. Reported by Anonymous on 2022-05-26 Low CVE-2022-3057: Inappropriate implementation in iframe Sandbox. Reported by Gareth Heyes on 2022-06-16 Low CVE-2022-3058: Use after free in Sign-In Flow. Reported by raven at KunLun lab on 2022-06-20 Affected Software/OS: 'chromium-browser-stable' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-3038 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ https://security.gentoo.org/glsa/202209-23 http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html https://crbug.com/1340253 Common Vulnerability Exposure (CVE) ID: CVE-2022-3039 https://crbug.com/1343348 Common Vulnerability Exposure (CVE) ID: CVE-2022-3040 https://crbug.com/1341539 Common Vulnerability Exposure (CVE) ID: CVE-2022-3041 https://crbug.com/1345947 Common Vulnerability Exposure (CVE) ID: CVE-2022-3042 https://crbug.com/1338553 Common Vulnerability Exposure (CVE) ID: CVE-2022-3043 https://crbug.com/1336979 Common Vulnerability Exposure (CVE) ID: CVE-2022-3044 https://crbug.com/1051198 Common Vulnerability Exposure (CVE) ID: CVE-2022-3045 https://crbug.com/1339648 Common Vulnerability Exposure (CVE) ID: CVE-2022-3046 https://crbug.com/1346245 Common Vulnerability Exposure (CVE) ID: CVE-2022-3047 https://crbug.com/1342586 Common Vulnerability Exposure (CVE) ID: CVE-2022-3048 https://crbug.com/1303308 Common Vulnerability Exposure (CVE) ID: CVE-2022-3049 https://crbug.com/1316892 Common Vulnerability Exposure (CVE) ID: CVE-2022-3050 https://crbug.com/1337132 Common Vulnerability Exposure (CVE) ID: CVE-2022-3051 https://crbug.com/1345245 Common Vulnerability Exposure (CVE) ID: CVE-2022-3052 https://crbug.com/1346154 Common Vulnerability Exposure (CVE) ID: CVE-2022-3053 https://crbug.com/1267867 Common Vulnerability Exposure (CVE) ID: CVE-2022-3054 https://crbug.com/1290236 Common Vulnerability Exposure (CVE) ID: CVE-2022-3055 https://crbug.com/1351969 Common Vulnerability Exposure (CVE) ID: CVE-2022-3056 https://crbug.com/1329460 Common Vulnerability Exposure (CVE) ID: CVE-2022-3057 https://crbug.com/1336904 Common Vulnerability Exposure (CVE) ID: CVE-2022-3058 https://crbug.com/1337676 Common Vulnerability Exposure (CVE) ID: CVE-2022-3071 https://crbug.com/1333995 Common Vulnerability Exposure (CVE) ID: CVE-2022-3075 https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html https://crbug.com/1358134 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |