openSUSE Security Update: Security update for chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2023:0016-1 Rating: important References: #1207018 Cross-References: CVE-2023-0128 CVE-2023-0129 CVE-2023-0130 CVE-2023-0131 CVE-2023-0132 CVE-2023-0133 CVE-2023-0134 CVE-2023-0136 CVE-2023-0137 CVE-2023-0138 CVE-2023-0139 CVE-2023-013e CVE-2023-0140 CVE-2023-0141 Affected Products: openSUSE Backports SLE-15-SP4 ______________________________________________________________________________ An update that fixes 14 vulnerabilities is now available. Description: This update for chromium fixes the following issues: Update to version 109.0.5414.74 (boo#1207018): - CVE-2023-0128: Use after free in Overview Mode - CVE-2023-0129: Heap buffer overflow in Network Service - CVE-2023-0130: Inappropriate implementation in Fullscreen API - CVE-2023-0131: Inappropriate implementation in iframe Sandbox - CVE-2023-0132: Inappropriate implementation in Permission prompts - CVE-2023-0133: Inappropriate implementation in Permission prompts - CVE-2023-0134: Use after free in Cart - CVE-2023-0135: Use after free in Cart - CVE-2023-0136: Inappropriate implementation in Fullscreen API - CVE-2023-0137: Heap buffer overflow in Platform Apps - CVE-2023-0138: Heap buffer overflow in libphonenumber - CVE-2023-0139: Insufficient validation of untrusted input in Downloads - CVE-2023-0140: Inappropriate implementation in File System API - CVE-2023-0141: Insufficient policy enforcement in CORS - Various fixes from internal audits, fuzzing and other initiatives Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP4: zypper in -t patch openSUSE-2023-16=1 Package List: - openSUSE Backports SLE-15-SP4 (aarch64 x86_64): chromedriver-109.0.5414.74-bp154.2.58.1 chromium-109.0.5414.74-bp154.2.58.1 References: https://www.suse.com/security/cve/CVE-2023-0128.html https://www.suse.com/security/cve/CVE-2023-0129.html https://www.suse.com/security/cve/CVE-2023-0130.html https://www.suse.com/security/cve/CVE-2023-0131.html https://www.suse.com/security/cve/CVE-2023-0132.html https://www.suse.com/security/cve/CVE-2023-0133.html https://www.suse.com/security/cve/CVE-2023-0134.html https://www.suse.com/security/cve/CVE-2023-0136.html https://www.suse.com/security/cve/CVE-2023-0137.html https://www.suse.com/security/cve/CVE-2023-0138.html https://www.suse.com/security/cve/CVE-2023-0139.html https://www.suse.com/security/cve/CVE-2023-013e.html https://www.suse.com/security/cve/CVE-2023-0140.html https://www.suse.com/security/cve/CVE-2023-0141.html https://bugzilla.suse.com/1207018