Name | CVE-2022-3444 |
Description | Insufficient data validation in File System API in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass File System restrictions via a crafted HTML page and malicious file. (Chromium security severity: Low) |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
References | DSA-5244-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
chromium (PTS) | buster, buster (security) | 90.0.4430.212-1~deb10u1 | vulnerable |
bullseye | 108.0.5359.94-1~deb11u1 | fixed | |
bullseye (security) | 109.0.5414.119-1~deb11u1 | fixed | |
bookworm, sid | 109.0.5414.119-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
chromium | source | buster | (unfixed) | end-of-life | ||
chromium | source | bullseye | 106.0.5249.61-1~deb11u1 | DSA-5244-1 | ||
chromium | source | (unstable) | 106.0.5249.61-1 |
[buster] - chromium <end-of-life> (see DSA 5046)
https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html