openSUSE-SU-2023:0300-1: important: Security update for chromium
openSUSE Security Update: Security update for chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2023:0300-1 Rating: important References: #1216111 Cross-References: CVE-2023-5218 CVE-2023-5473 CVE-2023-5474 CVE-2023-5475 CVE-2023-5476 CVE-2023-5477 CVE-2023-5478 CVE-2023-5479 CVE-2023-5481 CVE-2023-5483 CVE-2023-5484 CVE-2023-5485 CVE-2023-5486 CVE-2023-5487 CVSS scores: CVE-2023-5218 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2023-5473 (NVD) : 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVE-2023-5474 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2023-5475 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVE-2023-5476 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2023-5477 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVE-2023-5478 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N CVE-2023-5479 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVE-2023-5481 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVE-2023-5483 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVE-2023-5484 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVE-2023-5485 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVE-2023-5486 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVE-2023-5487 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Affected Products: openSUSE Backports SLE-15-SP4 openSUSE Backports SLE-15-SP5 ______________________________________________________________________________ An update that fixes 14 vulnerabilities is now available. Description: This update for chromium fixes the following issues: Chromium 118.0.5993.70 (boo#1216111) - CVE-2023-5218: Use after free in Site Isolation - CVE-2023-5487: Inappropriate implementation in Fullscreen - CVE-2023-5484: Inappropriate implementation in Navigation - CVE-2023-5475: Inappropriate implementation in DevTools - CVE-2023-5483: Inappropriate implementation in Intents - CVE-2023-5481: Inappropriate implementation in Downloads - CVE-2023-5476: Use after free in Blink History - CVE-2023-5474: Heap buffer overflow in PDF - CVE-2023-5479: Inappropriate implementation in Extensions API - CVE-2023-5485: Inappropriate implementation in Autofill - CVE-2023-5478: Inappropriate implementation in Autofill - CVE-2023-5477: Inappropriate implementation in Installer - CVE-2023-5486: Inappropriate implementation in Input - CVE-2023-5473: Use after free in Cast Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2023-300=1 - openSUSE Backports SLE-15-SP4: zypper in -t patch openSUSE-2023-300=1 Package List: - openSUSE Backports SLE-15-SP5 (aarch64 x86_64): chromedriver-118.0.5993.70-bp155.2.46.1 chromedriver-debuginfo-118.0.5993.70-bp155.2.46.1 chromium-118.0.5993.70-bp155.2.46.1 chromium-debuginfo-118.0.5993.70-bp155.2.46.1 - openSUSE Backports SLE-15-SP4 (aarch64 x86_64): chromedriver-118.0.5993.70-bp154.2.132.1 chromium-118.0.5993.70-bp154.2.132.1 References: https://www.suse.com/security/cve/CVE-2023-5218.html https://www.suse.com/security/cve/CVE-2023-5473.html https://www.suse.com/security/cve/CVE-2023-5474.html https://www.suse.com/security/cve/CVE-2023-5475.html https://www.suse.com/security/cve/CVE-2023-5476.html https://www.suse.com/security/cve/CVE-2023-5477.html https://www.suse.com/security/cve/CVE-2023-5478.html https://www.suse.com/security/cve/CVE-2023-5479.html https://www.suse.com/security/cve/CVE-2023-5481.html https://www.suse.com/security/cve/CVE-2023-5483.html https://www.suse.com/security/cve/CVE-2023-5484.html https://www.suse.com/security/cve/CVE-2023-5485.html https://www.suse.com/security/cve/CVE-2023-5486.html https://www.suse.com/security/cve/CVE-2023-5487.html https://bugzilla.suse.com/1216111
participants (1)
-
opensuse-security@opensuse.org