openSUSE Security Update: Security update for chromium

Announcement ID:    openSUSE-SU-2022:0019-1
Rating:             important
References:         #1194919 
Cross-References:   CVE-2022-0289 CVE-2022-0290 CVE-2022-0291
                    CVE-2022-0292 CVE-2022-0293 CVE-2022-0294
                    CVE-2022-0295 CVE-2022-0296 CVE-2022-0297
                    CVE-2022-0298 CVE-2022-0300 CVE-2022-0301
                    CVE-2022-0302 CVE-2022-0303 CVE-2022-0304
                    CVE-2022-0305 CVE-2022-0306 CVE-2022-0307
                    CVE-2022-0308 CVE-2022-0309 CVE-2022-0310
Affected Products:
                    openSUSE Backports SLE-15-SP3

   An update that fixes 22 vulnerabilities is now available.


   This update for chromium fixes the following issues:

   Chromium 97.0.4692.99 (boo#1194919):

   * CVE-2022-0289: Use after free in Safe browsing
   * CVE-2022-0290: Use after free in Site isolation
   * CVE-2022-0291: Inappropriate implementation in Storage
   * CVE-2022-0292: Inappropriate implementation in Fenced Frames
   * CVE-2022-0293: Use after free in Web packaging
   * CVE-2022-0294: Inappropriate implementation in Push messaging
   * CVE-2022-0295: Use after free in Omnibox
   * CVE-2022-0296: Use after free in Printing
   * CVE-2022-0297: Use after free in Vulkan
   * CVE-2022-0298: Use after free in Scheduling
   * CVE-2022-0300: Use after free in Text Input Method Editor
   * CVE-2022-0301: Heap buffer overflow in DevTools
   * CVE-2022-0302: Use after free in Omnibox
   * CVE-2022-0303: Race in GPU Watchdog
   * CVE-2022-0304: Use after free in Bookmarks
   * CVE-2022-0305: Inappropriate implementation in Service Worker API
   * CVE-2022-0306: Heap buffer overflow in PDFium
   * CVE-2022-0307: Use after free in Optimization Guide
   * CVE-2022-0308: Use after free in Data Transfer
   * CVE-2022-0309: Inappropriate implementation in Autofill
   * CVE-2022-0310: Heap buffer overflow in Task Manager
   * CVE-2022-0311: Heap buffer overflow in Task Manager

Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP3:

      zypper in -t patch openSUSE-2022-19=1

Package List:

   - openSUSE Backports SLE-15-SP3 (aarch64 x86_64):