Lucene search

K
suseSuseOPENSUSE-SU-2022:10120-1
HistorySep 12, 2022 - 12:00 a.m.

Security update for chromium (important)

2022-09-1200:00:00
lists.opensuse.org
23

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

An update that fixes 23 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

Chromium 105.0.5195.102 (boo#1203102):

  • CVE-2022-3075: Insufficient data validation in Mojo

Chromium 105.0.5195.52 (boo#1202964):

  • CVE-2022-3038: Use after free in Network Service
  • CVE-2022-3039: Use after free in WebSQL
  • CVE-2022-3040: Use after free in Layout
  • CVE-2022-3041: Use after free in WebSQL
  • CVE-2022-3042: Use after free in PhoneHub
  • CVE-2022-3043: Heap buffer overflow in Screen Capture
  • CVE-2022-3044: Inappropriate implementation in Site Isolation
  • CVE-2022-3045: Insufficient validation of untrusted input in V8
  • CVE-2022-3046: Use after free in Browser Tag
  • CVE-2022-3071: Use after free in Tab Strip
  • CVE-2022-3047: Insufficient policy enforcement in Extensions API
  • CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen
  • CVE-2022-3049: Use after free in SplitScreen
  • CVE-2022-3050: Heap buffer overflow in WebUI
  • CVE-2022-3051: Heap buffer overflow in Exosphere
  • CVE-2022-3052: Heap buffer overflow in Window Manager
  • CVE-2022-3053: Inappropriate implementation in Pointer Lock
  • CVE-2022-3054: Insufficient policy enforcement in DevTools
  • CVE-2022-3055: Use after free in Passwords
  • CVE-2022-3056: Insufficient policy enforcement in Content Security Policy
  • CVE-2022-3057: Inappropriate implementation in iframe Sandbox
  • CVE-2022-3058: Use after free in Sign-In Flow
  • Update chromium-symbolic.svg: this fixes boo#1202403.
  • Fix quoting in chrome-wrapper, don’t put cwd on LD_LIBRARY_PATH

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Backports SLE-15-SP3:

    zypper in -t patch openSUSE-2022-10120=1

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H