openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2023:0016-1
Rating:             important
References:         #1207018 
Cross-References:   CVE-2023-0128 CVE-2023-0129 CVE-2023-0130
                    CVE-2023-0131 CVE-2023-0132 CVE-2023-0133
                    CVE-2023-0134 CVE-2023-0136 CVE-2023-0137
                    CVE-2023-0138 CVE-2023-0139 CVE-2023-013e
                    CVE-2023-0140 CVE-2023-0141
Affected Products:
                    openSUSE Backports SLE-15-SP4
______________________________________________________________________________

   An update that fixes 14 vulnerabilities is now available.

Description:

   This update for chromium fixes the following issues:

   Update to version 109.0.5414.74 (boo#1207018):

   - CVE-2023-0128: Use after free in Overview Mode
   - CVE-2023-0129: Heap buffer overflow in Network Service
   - CVE-2023-0130: Inappropriate implementation in Fullscreen API
   - CVE-2023-0131: Inappropriate implementation in iframe Sandbox
   - CVE-2023-0132: Inappropriate implementation in Permission prompts
   - CVE-2023-0133: Inappropriate implementation in Permission prompts
   - CVE-2023-0134: Use after free in Cart
   - CVE-2023-0135: Use after free in Cart
   - CVE-2023-0136: Inappropriate implementation in Fullscreen API
   - CVE-2023-0137: Heap buffer overflow in Platform Apps
   - CVE-2023-0138: Heap buffer overflow in libphonenumber
   - CVE-2023-0139: Insufficient validation of untrusted input in Downloads
   - CVE-2023-0140: Inappropriate implementation in File System API
   - CVE-2023-0141: Insufficient policy enforcement in CORS
   - Various fixes from internal audits, fuzzing and other initiatives


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP4:

      zypper in -t patch openSUSE-2023-16=1



Package List:

   - openSUSE Backports SLE-15-SP4 (aarch64 x86_64):

      chromedriver-109.0.5414.74-bp154.2.58.1
      chromium-109.0.5414.74-bp154.2.58.1


References:

   https://www.suse.com/security/cve/CVE-2023-0128.html
   https://www.suse.com/security/cve/CVE-2023-0129.html
   https://www.suse.com/security/cve/CVE-2023-0130.html
   https://www.suse.com/security/cve/CVE-2023-0131.html
   https://www.suse.com/security/cve/CVE-2023-0132.html
   https://www.suse.com/security/cve/CVE-2023-0133.html
   https://www.suse.com/security/cve/CVE-2023-0134.html
   https://www.suse.com/security/cve/CVE-2023-0136.html
   https://www.suse.com/security/cve/CVE-2023-0137.html
   https://www.suse.com/security/cve/CVE-2023-0138.html
   https://www.suse.com/security/cve/CVE-2023-0139.html
      https://www.suse.com/security/cve/CVE-2023-0140.html
   https://www.suse.com/security/cve/CVE-2023-0141.html
   https://bugzilla.suse.com/1207018

openSUSE: 2023:0016-1 important: chromium

January 13, 2023
An update that fixes 14 vulnerabilities is now available

Description

This update for chromium fixes the following issues: Update to version 109.0.5414.74 (boo#1207018): - CVE-2023-0128: Use after free in Overview Mode - CVE-2023-0129: Heap buffer overflow in Network Service - CVE-2023-0130: Inappropriate implementation in Fullscreen API - CVE-2023-0131: Inappropriate implementation in iframe Sandbox - CVE-2023-0132: Inappropriate implementation in Permission prompts - CVE-2023-0133: Inappropriate implementation in Permission prompts - CVE-2023-0134: Use after free in Cart - CVE-2023-0135: Use after free in Cart - CVE-2023-0136: Inappropriate implementation in Fullscreen API - CVE-2023-0137: Heap buffer overflow in Platform Apps - CVE-2023-0138: Heap buffer overflow in libphonenumber - CVE-2023-0139: Insufficient validation of untrusted input in Downloads - CVE-2023-0140: Inappropriate implementation in File System API - CVE-2023-0141: Insufficient policy enforcement in CORS - Various fixes from internal audits, fuzzing and other initiatives

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP4: zypper in -t patch openSUSE-2023-16=1


Package List

- openSUSE Backports SLE-15-SP4 (aarch64 x86_64): chromedriver-109.0.5414.74-bp154.2.58.1 chromium-109.0.5414.74-bp154.2.58.1


References

https://www.suse.com/security/cve/CVE-2023-0128.html https://www.suse.com/security/cve/CVE-2023-0129.html https://www.suse.com/security/cve/CVE-2023-0130.html https://www.suse.com/security/cve/CVE-2023-0131.html https://www.suse.com/security/cve/CVE-2023-0132.html https://www.suse.com/security/cve/CVE-2023-0133.html https://www.suse.com/security/cve/CVE-2023-0134.html https://www.suse.com/security/cve/CVE-2023-0136.html https://www.suse.com/security/cve/CVE-2023-0137.html https://www.suse.com/security/cve/CVE-2023-0138.html https://www.suse.com/security/cve/CVE-2023-0139.html https://www.suse.com/security/cve/CVE-2023-0140.html https://www.suse.com/security/cve/CVE-2023-0141.html https://bugzilla.suse.com/1207018


Severity
Announcement ID: openSUSE-SU-2023:0016-1
Rating: important
Affected Products: openSUSE Backports SLE-15-SP4 .

Related News