Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Category Archives: Advisories
CVE-2020-35538
A crafted input file could cause a null pointer dereference in jcopy_sample_rows() when processed by libjpeg-turbo.
CVE-2020-35536
In gcc, an internal compiler error in match_reload function at lra-constraints.c may cause a crash through a crafted input file.
CVE-2020-35537
In gcc, a crafted input source file could cause g++ to crash during compilation when provided certain optimization flags. The problem resides in the ipcp_store_vr_results function in gcc/ipa-cp.c.
zlib-1.2.11-33.fc36
FEDORA-2022-b8232d1cca
Packages in this update:
zlib-1.2.11-33.fc36
Update description:
Fix for the CVE-2022-37434
zlib-1.2.11-32.fc35
FEDORA-2022-0b517a5397
Packages in this update:
zlib-1.2.11-32.fc35
Update description:
Fix for the CVE-2022-37434
zlib-1.2.12-5.fc37
FEDORA-2022-3c28ae0cd8
Packages in this update:
zlib-1.2.12-5.fc37
Update description:
Fix for the CVE-2022-37434
ZDI-22-1177: Trend Micro Maximum Security Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
ZDI-22-1176: Trend Micro Maximum Security Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
ZDI-22-1175: Trend Micro Maximum Security Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.