openSUSE-SU-2022:0019-1: important: Security update for chromium
openSUSE Security Update: Security update for chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2022:0019-1 Rating: important References: #1194919 Cross-References: CVE-2022-0289 CVE-2022-0290 CVE-2022-0291 CVE-2022-0292 CVE-2022-0293 CVE-2022-0294 CVE-2022-0295 CVE-2022-0296 CVE-2022-0297 CVE-2022-0298 CVE-2022-0300 CVE-2022-0301 CVE-2022-0302 CVE-2022-0303 CVE-2022-0304 CVE-2022-0305 CVE-2022-0306 CVE-2022-0307 CVE-2022-0308 CVE-2022-0309 CVE-2022-0310 CVE-2022-0311 Affected Products: openSUSE Backports SLE-15-SP3 ______________________________________________________________________________ An update that fixes 22 vulnerabilities is now available. Description: This update for chromium fixes the following issues: Chromium 97.0.4692.99 (boo#1194919): * CVE-2022-0289: Use after free in Safe browsing * CVE-2022-0290: Use after free in Site isolation * CVE-2022-0291: Inappropriate implementation in Storage * CVE-2022-0292: Inappropriate implementation in Fenced Frames * CVE-2022-0293: Use after free in Web packaging * CVE-2022-0294: Inappropriate implementation in Push messaging * CVE-2022-0295: Use after free in Omnibox * CVE-2022-0296: Use after free in Printing * CVE-2022-0297: Use after free in Vulkan * CVE-2022-0298: Use after free in Scheduling * CVE-2022-0300: Use after free in Text Input Method Editor * CVE-2022-0301: Heap buffer overflow in DevTools * CVE-2022-0302: Use after free in Omnibox * CVE-2022-0303: Race in GPU Watchdog * CVE-2022-0304: Use after free in Bookmarks * CVE-2022-0305: Inappropriate implementation in Service Worker API * CVE-2022-0306: Heap buffer overflow in PDFium * CVE-2022-0307: Use after free in Optimization Guide * CVE-2022-0308: Use after free in Data Transfer * CVE-2022-0309: Inappropriate implementation in Autofill * CVE-2022-0310: Heap buffer overflow in Task Manager * CVE-2022-0311: Heap buffer overflow in Task Manager Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2022-19=1 Package List: - openSUSE Backports SLE-15-SP3 (aarch64 x86_64): chromedriver-97.0.4692.99-bp153.2.57.1 chromium-97.0.4692.99-bp153.2.57.1 References: https://www.suse.com/security/cve/CVE-2022-0289.html https://www.suse.com/security/cve/CVE-2022-0290.html https://www.suse.com/security/cve/CVE-2022-0291.html https://www.suse.com/security/cve/CVE-2022-0292.html https://www.suse.com/security/cve/CVE-2022-0293.html https://www.suse.com/security/cve/CVE-2022-0294.html https://www.suse.com/security/cve/CVE-2022-0295.html https://www.suse.com/security/cve/CVE-2022-0296.html https://www.suse.com/security/cve/CVE-2022-0297.html https://www.suse.com/security/cve/CVE-2022-0298.html https://www.suse.com/security/cve/CVE-2022-0300.html https://www.suse.com/security/cve/CVE-2022-0301.html https://www.suse.com/security/cve/CVE-2022-0302.html https://www.suse.com/security/cve/CVE-2022-0303.html https://www.suse.com/security/cve/CVE-2022-0304.html https://www.suse.com/security/cve/CVE-2022-0305.html https://www.suse.com/security/cve/CVE-2022-0306.html https://www.suse.com/security/cve/CVE-2022-0307.html https://www.suse.com/security/cve/CVE-2022-0308.html https://www.suse.com/security/cve/CVE-2022-0309.html https://www.suse.com/security/cve/CVE-2022-0310.html https://www.suse.com/security/cve/CVE-2022-0311.html https://bugzilla.suse.com/1194919
participants (1)
-
opensuse-security@opensuse.org