![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2022.0451 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2022-0451) |
Summary: | The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0451 advisory. |
Description: | Summary: The remote host is missing an update for the 'chromium-browser-stable' package(s) announced via the MGASA-2022-0451 advisory. Vulnerability Insight: The chromium-browser-stable package has been updated to the new 108 branch with the 108.0.5359.94 release, fixing many bugs and 29 vulnerabilities, together with 107.0.5304.121 and 108.0.5359.71. Some of the security fixes are - CVE-2022-4174: Type Confusion in V8. Reported by Zhenghang Xiao (@Kipreyyy) on 2022-10-27 CVE-2022-4175: Use after free in Camera Capture. Reported by Leecraso and Guang Gong of 360 Vulnerability Research Institute on 2022-11-04 CVE-2022-4176: Out of bounds write in Lacros Graphics. Reported by @ginggilBesel on 2022-09-08 CVE-2022-4177: Use after free in Extensions. Reported by Chaoyuan Peng (@ret2happy) on 2022-10-28 CVE-2022-4178: Use after free in Mojo. Reported by Sergei Glazunov of Google Project Zero on 2022-10-18 CVE-2022-4179: Use after free in Audio. Reported by Sergei Glazunov of Google Project Zero on 2022-10-24 CVE-2022-4180: Use after free in Mojo. Reported by Anonymous on 2022-10-26 CVE-2022-4181: Use after free in Forms. Reported by Aviv A. on 2022-11-09 CVE-2022-4182: Inappropriate implementation in Fenced Frames. Reported by Peter Nemeth on 2022-09-28 CVE-2022-4183: Insufficient policy enforcement in Popup Blocker. Reported by David Sievers on 2021-09-22 CVE-2022-4184: Insufficient policy enforcement in Autofill. Reported by Ahmed ElMasry on 2022-09-01 CVE-2022-4185: Inappropriate implementation in Navigation. Reported by James Lee (@Windowsrcer) on 2022-10-10 CVE-2022-4186: Insufficient validation of untrusted input in Downloads. Reported by Luan Herrera (@lbherrera_) on 2022-10-21 CVE-2022-4187: Insufficient policy enforcement in DevTools. Reported by Axel Chong on 2022-11-04 CVE-2022-4188: Insufficient validation of untrusted input in CORS. Reported by Philipp Beer (TU Wien) on 2022-06-30 CVE-2022-4189: Insufficient policy enforcement in DevTools. Reported by NDevTK on 2022-07-15 CVE-2022-4190: Insufficient data validation in Directory. Reported by Axel Chong on 2022-10-27 CVE-2022-4191: Use after free in Sign-In. Reported by Jaehun Jeong(@n3sk) of Theori on 2022-10-12 CVE-2022-4192: Use after free in Live Caption. Reported by Samet Bekmezci @sametbekmezci on 2022-07-14 CVE-2022-4193: Insufficient policy enforcement in File System API. Reported by Axel Chong on 2022-08-19 CVE-2022-4194: Use after free in Accessibility. Reported by Anonymous on 2022-10-03 CVE-2022-4195: Insufficient policy enforcement in Safe Browsing. Reported by Eric Lawrence of Microsoft on 2022-10-06 CVE-2022-4135: Heap buffer overflow in GPU. Reported by Clement Lecigne of Google's Threat Analysis Group on 2022-11-22 CVE-2022-4262: Type Confusion in V8. Reported by Clement Lecigne of Google's Threat Analysis Group on 2022-11-29 Google is aware that exploits for CVE-2022-4135 and CVE-2022-4262 exist in the wild. Affected Software/OS: 'chromium-browser-stable' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-4135 https://security.gentoo.org/glsa/202305-10 https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_24.html https://crbug.com/1392715 Common Vulnerability Exposure (CVE) ID: CVE-2022-4174 https://security.gentoo.org/glsa/202311-11 https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html https://crbug.com/1379054 Common Vulnerability Exposure (CVE) ID: CVE-2022-4175 https://crbug.com/1381401 Common Vulnerability Exposure (CVE) ID: CVE-2022-4176 https://crbug.com/1361066 Common Vulnerability Exposure (CVE) ID: CVE-2022-4177 https://crbug.com/1379242 Common Vulnerability Exposure (CVE) ID: CVE-2022-4178 https://crbug.com/1376099 Common Vulnerability Exposure (CVE) ID: CVE-2022-4179 https://crbug.com/1377783 Common Vulnerability Exposure (CVE) ID: CVE-2022-4180 https://crbug.com/1378564 Common Vulnerability Exposure (CVE) ID: CVE-2022-4181 https://crbug.com/1382581 Common Vulnerability Exposure (CVE) ID: CVE-2022-4182 https://crbug.com/1368739 Common Vulnerability Exposure (CVE) ID: CVE-2022-4183 https://crbug.com/1251790 Common Vulnerability Exposure (CVE) ID: CVE-2022-4184 https://crbug.com/1358647 Common Vulnerability Exposure (CVE) ID: CVE-2022-4185 https://crbug.com/1373025 Common Vulnerability Exposure (CVE) ID: CVE-2022-4186 https://crbug.com/1377165 Common Vulnerability Exposure (CVE) ID: CVE-2022-4187 https://crbug.com/1381217 Common Vulnerability Exposure (CVE) ID: CVE-2022-4188 https://crbug.com/1340879 Common Vulnerability Exposure (CVE) ID: CVE-2022-4189 https://crbug.com/1344647 Common Vulnerability Exposure (CVE) ID: CVE-2022-4190 https://crbug.com/1378997 Common Vulnerability Exposure (CVE) ID: CVE-2022-4191 https://crbug.com/1373941 Common Vulnerability Exposure (CVE) ID: CVE-2022-4192 https://crbug.com/1344514 Common Vulnerability Exposure (CVE) ID: CVE-2022-4193 https://crbug.com/1354518 Common Vulnerability Exposure (CVE) ID: CVE-2022-4194 https://crbug.com/1370562 Common Vulnerability Exposure (CVE) ID: CVE-2022-4195 https://crbug.com/1371926 Common Vulnerability Exposure (CVE) ID: CVE-2022-4262 https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop.html https://crbug.com/1394403 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |