openSUSE Security Update: Security update for chromium ______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0016-1 Rating: important References: #1207018 Cross-References: CVE-2023-0128 CVE-2023-0129 CVE-2023-0130 CVE-2023-0131 CVE-2023-0132 CVE-2023-0133 CVE-2023-0134 CVE-2023-0136 CVE-2023-0137 CVE-2023-0138 CVE-2023-0139 CVE-2023-013e CVE-2023-0140 CVE-2023-0141 Affected Products: openSUSE Backports SLE-15-SP4 ______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Update to version 109.0.5414.74 (boo#1207018):
- CVE-2023-0128: Use after free in Overview Mode - CVE-2023-0129: Heap buffer overflow in Network Service - CVE-2023-0130: Inappropriate implementation in Fullscreen API - CVE-2023-0131: Inappropriate implementation in iframe Sandbox - CVE-2023-0132: Inappropriate implementation in Permission prompts - CVE-2023-0133: Inappropriate implementation in Permission prompts - CVE-2023-0134: Use after free in Cart - CVE-2023-0135: Use after free in Cart - CVE-2023-0136: Inappropriate implementation in Fullscreen API - CVE-2023-0137: Heap buffer overflow in Platform Apps - CVE-2023-0138: Heap buffer overflow in libphonenumber - CVE-2023-0139: Insufficient validation of untrusted input in Downloads - CVE-2023-0140: Inappropriate implementation in File System API - CVE-2023-0141: Insufficient policy enforcement in CORS - Various fixes from internal audits, fuzzing and other initiatives
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2023-16=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 x86_64):
chromedriver-109.0.5414.74-bp154.2.58.1 chromium-109.0.5414.74-bp154.2.58.1
References:
https://www.suse.com/security/cve/CVE-2023-0128.html https://www.suse.com/security/cve/CVE-2023-0129.html https://www.suse.com/security/cve/CVE-2023-0130.html https://www.suse.com/security/cve/CVE-2023-0131.html https://www.suse.com/security/cve/CVE-2023-0132.html https://www.suse.com/security/cve/CVE-2023-0133.html https://www.suse.com/security/cve/CVE-2023-0134.html https://www.suse.com/security/cve/CVE-2023-0136.html https://www.suse.com/security/cve/CVE-2023-0137.html https://www.suse.com/security/cve/CVE-2023-0138.html https://www.suse.com/security/cve/CVE-2023-0139.html https://www.suse.com/security/cve/CVE-2023-013e.html https://www.suse.com/security/cve/CVE-2023-0140.html https://www.suse.com/security/cve/CVE-2023-0141.html https://bugzilla.suse.com/1207018
security-announce@lists.opensuse.org