Updated chromium-browser-stable packages fix security vulnerability
Publication date: 04 Sep 2022Modification date: 04 Sep 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-3038 , CVE-2022-3039 , CVE-2022-3040 , CVE-2022-3041 , CVE-2022-3042 , CVE-2022-3043 , CVE-2022-3044 , CVE-2022-3045 , CVE-2022-3046 , CVE-2022-3047 , CVE-2022-3048 , CVE-2022-3049 , CVE-2022-3050 , CVE-2022-3051 , CVE-2022-3052 , CVE-2022-3053 , CVE-2022-3054 , CVE-2022-3055 , CVE-2022-3056 , CVE-2022-3057 , CVE-2022-3058 , CVE-2022-3071 , CVE-2022-3075
Description
The chromium-browser-stable package has been updated to the new 105 branch with the 105.0.5195.102 version, fixing many bugs and 25 vulnerabilities. Google is aware of reports that an exploit for CVE-2022-3075 exists in the wild. Some of the addressed CVE are listed below: High CVE-2022-3075: Insufficient data validation in Mojo. Reported by Anonymous on 2022-08-30 Critical CVE-2022-3038: Use after free in Network Service. Reported by Sergei Glazunov of Google Project Zero on 2022-06-28 High CVE-2022-3039: Use after free in WebSQL. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research Institute on 2022-07-11 High CVE-2022-3040: Use after free in Layout. Reported by Anonymous on 2022-07-03 High CVE-2022-3041: Use after free in WebSQL. Reported by Ziling Chen and Nan Wang(@eternalsakura13) of 360 Vulnerability Research Institute on 2022-07-20 High CVE-2022-3042: Use after free in PhoneHub. Reported by koocola(@alo_cook) and Guang Gong of 360 Vulnerability Research Institute on 2022-06-22 High CVE-2022-3043: Heap buffer overflow in Screen Capture. Reported by @ginggilBesel on 2022-06-16 High CVE-2022-3044: Inappropriate implementation in Site Isolation. Reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research on 2020-02-12 High CVE-2022-3045: Insufficient validation of untrusted input in V8. Reported by Ben Noordhuison 2022-06-26 High CVE-2022-3046: Use after free in Browser Tag. Reported by Rong Jian of VRI on 2022-07-21 High CVE-2022-3071: Use after free in Tab Strip. Reported by @ginggilBesel on 2022-06-06 Medium CVE-2022-3047: Insufficient policy enforcement in Extensions API. Reported by Maurice Dauer on 2022-07-07 Medium CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen. Reported by Andr.Ess on 2022-03-06 Medium CVE-2022-3049: Use after free in SplitScreen. Reported by @ginggilBesel on 2022-04-17 Medium CVE-2022-3050: Heap buffer overflow in WebUI. Reported by Zhihua Yao of KunLun Lab on 2022-06-17 Medium CVE-2022-3051: Heap buffer overflow in Exosphere. Reported by @ginggilBesel on 2022-07-18 Medium CVE-2022-3052: Heap buffer overflow in Window Manager. Reported by Khalil Zhani on 2022-07-21 Medium CVE-2022-3053: Inappropriate implementation in Pointer Lock. Reported by Jesper van den Ende (Pelican Party Studios) on 2021-11-08 Medium CVE-2022-3054: Insufficient policy enforcement in DevTools. Reported by Kuilin Li on 2022-01-24 Medium CVE-2022-3055: Use after free in Passwords. Reported by Weipeng Jiang (@Krace) and Guang Gong of 360 Vulnerability Research Institute on 2022-08-11 Low CVE-2022-3056: Insufficient policy enforcement in Content Security Policy. Reported by Anonymous on 2022-05-26 Low CVE-2022-3057: Inappropriate implementation in iframe Sandbox. Reported by Gareth Heyes on 2022-06-16 Low CVE-2022-3058: Use after free in Sign-In Flow. Reported by raven at KunLun lab on 2022-06-20
References
- https://bugs.mageia.org/show_bug.cgi?id=30802
- https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html
- https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html
- https://blog.chromium.org/2022/08/chrome-105-beta-custom-highlighting.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3075
SRPMS
8/core
- chromium-browser-stable-105.0.5195.102-1.mga8