{"id":271174,"date":"2022-08-03T09:39:13","date_gmt":"2022-08-03T07:39:13","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=271174"},"modified":"2022-08-31T15:03:22","modified_gmt":"2022-08-31T13:03:22","slug":"chrome-104-0-5112-x-fixt-schwachstellen","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2022\/08\/03\/chrome-104-0-5112-x-fixt-schwachstellen\/","title":{"rendered":"Chrome 104.0.5112.x fixt Schwachstellen"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Chrome\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/06\/Chrome-01.jpg\" alt=\"Chrome\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2022\/08\/03\/chrome-104-0-5112-x-fixt-schwachstellen\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Google hat zum 2. August 2022 das Update des Google Chrome 104.0.5112.79 f\u00fcr Linux und MacOS sowie 104.0.5112.79\/80\/81 f\u00fcr Windows\u00a0 auf dem Desktop im Stable Channel freigegeben. Mit dem Sicherheitsupdate werden zahlreiche Schwachstellen geschlossen. Die 104er Version ist zudem die Basis f\u00fcr die Extended Stable.<\/p>\n<p><!--more--><\/p>\n<h2>Google Chrome 104.0.5112.79\/80\/81<\/h2>\n<p>Der <a href=\"https:\/\/chromereleases.googleblog.com\/2022\/08\/stable-channel-update-for-desktop.html\">betreffende Eintrag<\/a> f\u00fcr den Chrome 104.0.5112.x im Stable Channel findet sich im <a href=\"https:\/\/chromereleases.googleblog.com\/\" target=\"_blank\" rel=\"noopener\">Google-Blog<\/a>. Mit diesem Update werden diverse Sicherheitsl\u00fccken beseitigt, wobei Google nur die nachfolgend aufgef\u00fchrten Schwachstellen dokumentiert.<\/p>\n<ul>\n<li>[$15000][1325699] High CVE-2022-2603: Use after free in Omnibox. Reported by Anonymous on 2022-05-16<\/li>\n<li>[$10000][1335316] High CVE-2022-2604: Use after free in Safe Browsing. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab on 2022-06-10<\/li>\n<li>[$7000][1338470] High CVE-2022-2605: Out of bounds read in Dawn. Reported by Looben Yang on 2022-06-22<\/li>\n<li>[$5000][1330489] High CVE-2022-2606: Use after free in Managed devices API. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab on 2022-05-31<\/li>\n<li>[$3000][1286203] High CVE-2022-2607: Use after free in Tab Strip. Reported by @ginggilBesel on 2022-01-11<\/li>\n<li>[$3000][1330775] High CVE-2022-2608: Use after free in Overview Mode. Reported by Khalil Zhani on 2022-06-01<\/li>\n<li>[$TBD][1338560] High CVE-2022-2609: Use after free in Nearby Share. Reported by koocola(@alo_cook) and Guang Gong of 360 Vulnerability Research Institute on 2022-06-22<\/li>\n<li>[$8000][1278255] Medium CVE-2022-2610: Insufficient policy enforcement in Background Fetch. Reported by Maurice Dauer on 2021-12-09<\/li>\n<li>[$5000][1320538] Medium CVE-2022-2611: Inappropriate implementation in Fullscreen API. Reported by Irvan Kurniawan (sourc7) on 2022-04-28<\/li>\n<li>[$5000][1321350] Medium CVE-2022-2612: Side-channel information leakage in Keyboard input. Reported by Erik Kraft (erik.kraft5@gmx.at), Martin Schwarzl (martin.schwarzl@iaik.tugraz.at) on 2022-04-30<\/li>\n<li>[$5000][1325256] Medium CVE-2022-2613: Use after free in Input. Reported by Piotr Tworek (Vewd) on 2022-05-13<\/li>\n<li>[$5000][1341907] Medium CVE-2022-2614: Use after free in Sign-In Flow. Reported by raven at KunLun lab on 2022-07-05<\/li>\n<li>[$4000][1268580] Medium CVE-2022-2615: Insufficient policy enforcement in Cookies. Reported by Maurice Dauer on 2021-11-10<\/li>\n<li>[$3000][1302159] Medium CVE-2022-2616: Inappropriate implementation in Extensions API. Reported by Alesandro Ortiz on 2022-03-02<\/li>\n<li>[$2000][1292451] Medium CVE-2022-2617: Use after free in Extensions API. Reported by @ginggilBesel on 2022-01-31<\/li>\n<li>[$2000][1308422] Medium CVE-2022-2618: Insufficient validation of untrusted input in Internals. Reported by asnine on 2022-03-21<\/li>\n<li>[$2000][1332881] Medium CVE-2022-2619: Insufficient validation of untrusted input in Settings. Reported by Oliver Dunk on 2022-06-04<\/li>\n<li>[$2000][1337304] Medium CVE-2022-2620: Use after free in WebUI. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab on 2022-06-17<\/li>\n<li>[$1000][1323449] Medium CVE-2022-2621: Use after free in Extensions. Reported by Huyna at Viettel Cyber Security on 2022-05-07<\/li>\n<li>[$1000][1332392] Medium CVE-2022-2622: Insufficient validation of untrusted input in Safe Browsing. Reported by Imre Rad (@ImreRad) and @j00sean on 2022-06-03<\/li>\n<li>[$1000][1337798] Medium CVE-2022-2623: Use after free in Offline. Reported by raven at KunLun lab on 2022-06-20<\/li>\n<li>[$TBD][1339745] Medium CVE-2022-2624: Heap buffer overflow in PDF. Reported by YU-CHANG CHEN and CHIH-YEN CHANG, working with DEVCORE Internship Program on 2022-06-27<\/li>\n<\/ul>\n<p>Weitere Bugs wurden durch interne Tests aufgedeckt und beseitigt. Google gibt aber keine weiteren Erl\u00e4uterungen, was Sache ist. Die Chrome-Version f\u00fcr Windows wird in den n\u00e4chsten Tagen \u00fcber die automatische Update-Funktion auf die Systeme ausgerollt. Man kann den Browser auch manuell (\u00fcber das Men\u00fc und den Befehl <em>\u00dcber Google Chrome<\/em>) aktualisieren. Die aktuelle Build des Chrome-Browsers l\u00e4sst sich auch <a href=\"https:\/\/www.google.com\/chrome\/\" target=\"_blank\" rel=\"noopener\">hier herunterladen<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Google hat zum 2. August 2022 das Update des Google Chrome 104.0.5112.79 f\u00fcr Linux und MacOS sowie 104.0.5112.79\/80\/81 f\u00fcr Windows\u00a0 auf dem Desktop im Stable Channel freigegeben. Mit dem Sicherheitsupdate werden zahlreiche Schwachstellen geschlossen. Die 104er Version ist zudem die &hellip; <a href=\"https:\/\/borncity.com\/blog\/2022\/08\/03\/chrome-104-0-5112-x-fixt-schwachstellen\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1356,426,185],"tags":[406],"class_list":["post-271174","post","type-post","status-publish","format-standard","hentry","category-google-chrome-internet","category-sicherheit","category-update","tag-chrome"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/271174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=271174"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/271174\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=271174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=271174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=271174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}