SUSE 5081 Published by

Updated Chromium packages are available for SUSE Linux Enterprise 15 SP5:

openSUSE-SU-2024:0123-1: important: Security update for chromium




openSUSE-SU-2024:0123-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2024:0123-1
Rating: important
References: #1221732 #1222035 #1222260 #1222707 #1222958
#1223845 #1223846 #1224045
Cross-References: CVE-2024-2625 CVE-2024-2626 CVE-2024-2627
CVE-2024-2628 CVE-2024-2883 CVE-2024-2885
CVE-2024-2886 CVE-2024-2887 CVE-2024-3156
CVE-2024-3157 CVE-2024-3158 CVE-2024-3159
CVE-2024-3515 CVE-2024-3516 CVE-2024-3832
CVE-2024-3833 CVE-2024-3834 CVE-2024-3837
CVE-2024-3838 CVE-2024-3839 CVE-2024-3840
CVE-2024-3841 CVE-2024-3843 CVE-2024-3844
CVE-2024-3845 CVE-2024-3846 CVE-2024-3847
CVE-2024-4058 CVE-2024-4059 CVE-2024-4060
CVE-2024-4331 CVE-2024-4368 CVE-2024-4558
CVE-2024-4559 CVE-2024-4671
CVSS scores:
CVE-2024-2625 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2024-2626 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2024-2627 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2024-2628 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2024-3156 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2024-3158 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2024-3834 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2024-3837 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2024-3838 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2024-3839 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Affected Products:
openSUSE Backports SLE-15-SP5
_______________________________

An update that fixes 35 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

- Chromium 124.0.6367.201
* CVE-2024-4671: Use after free in Visuals

- Chromium 124.0.6367.155 (boo#1224045)
* CVE-2024-4558: Use after free in ANGLE
* CVE-2024-4559: Heap buffer overflow in WebAudio

- Chromium 124.0.6367.118 (boo#1223846)
* CVE-2024-4331: Use after free in Picture In Picture
* CVE-2024-4368: Use after free in Dawn

- Chromium 124.0.6367.78 (boo#1223845)
* CVE-2024-4058: Type Confusion in ANGLE
* CVE-2024-4059: Out of bounds read in V8 API
* CVE-2024-4060: Use after free in Dawn

- Chromium 124.0.6367.60 (boo#1222958)
* CVE-2024-3832: Object corruption in V8.
* CVE-2024-3833: Object corruption in WebAssembly.
* CVE-2024-3834: Use after free in Downloads. Reported by ChaobinZhang
* CVE-2024-3837: Use after free in QUIC.
* CVE-2024-3838: Inappropriate implementation in Autofill.
* CVE-2024-3839: Out of bounds read in Fonts.
* CVE-2024-3840: Insufficient policy enforcement in Site Isolation.
* CVE-2024-3841: Insufficient data validation in Browser Switcher.
* CVE-2024-3843: Insufficient data validation in Downloads.
* CVE-2024-3844: Inappropriate implementation in Extensions.
* CVE-2024-3845: Inappropriate implementation in Network.
* CVE-2024-3846: Inappropriate implementation in Prompts.
* CVE-2024-3847: Insufficient policy enforcement in WebUI.

- Chromium 123.0.6312.122 (boo#1222707)
* CVE-2024-3157: Out of bounds write in Compositing
* CVE-2024-3516: Heap buffer overflow in ANGLE
* CVE-2024-3515: Use after free in Dawn

- Chromium 123.0.6312.105 (boo#1222260)
* CVE-2024-3156: Inappropriate implementation in V8
* CVE-2024-3158: Use after free in Bookmarks
* CVE-2024-3159: Out of bounds memory access in V8

- Chromium 123.0.6312.86 (boo#1222035)
* CVE-2024-2883: Use after free in ANGLE
* CVE-2024-2885: Use after free in Dawn
* CVE-2024-2886: Use after free in WebCodecs
* CVE-2024-2887: Type Confusion in WebAssembly

- Chromium 123.0.6312.58 (boo#1221732)
* CVE-2024-2625: Object lifecycle issue in V8
* CVE-2024-2626: Out of bounds read in Swiftshader
* CVE-2024-2627: Use after free in Canvas
* CVE-2024-2628: Inappropriate implementation in Downloads

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP5:

zypper in -t patch openSUSE-2024-123=1

Package List:

- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):

chromedriver-124.0.6367.201-bp155.2.78.1
chromium-124.0.6367.201-bp155.2.78.1

References:

https://www.suse.com/security/cve/CVE-2024-2625.html
https://www.suse.com/security/cve/CVE-2024-2626.html
https://www.suse.com/security/cve/CVE-2024-2627.html
https://www.suse.com/security/cve/CVE-2024-2628.html
https://www.suse.com/security/cve/CVE-2024-2883.html
https://www.suse.com/security/cve/CVE-2024-2885.html
https://www.suse.com/security/cve/CVE-2024-2886.html
https://www.suse.com/security/cve/CVE-2024-2887.html
https://www.suse.com/security/cve/CVE-2024-3156.html
https://www.suse.com/security/cve/CVE-2024-3157.html
https://www.suse.com/security/cve/CVE-2024-3158.html
https://www.suse.com/security/cve/CVE-2024-3159.html
https://www.suse.com/security/cve/CVE-2024-3515.html
https://www.suse.com/security/cve/CVE-2024-3516.html
https://www.suse.com/security/cve/CVE-2024-3832.html
https://www.suse.com/security/cve/CVE-2024-3833.html
https://www.suse.com/security/cve/CVE-2024-3834.html
https://www.suse.com/security/cve/CVE-2024-3837.html
https://www.suse.com/security/cve/CVE-2024-3838.html
https://www.suse.com/security/cve/CVE-2024-3839.html
https://www.suse.com/security/cve/CVE-2024-3840.html
https://www.suse.com/security/cve/CVE-2024-3841.html
https://www.suse.com/security/cve/CVE-2024-3843.html
https://www.suse.com/security/cve/CVE-2024-3844.html
https://www.suse.com/security/cve/CVE-2024-3845.html
https://www.suse.com/security/cve/CVE-2024-3846.html
https://www.suse.com/security/cve/CVE-2024-3847.html
https://www.suse.com/security/cve/CVE-2024-4058.html
https://www.suse.com/security/cve/CVE-2024-4059.html
https://www.suse.com/security/cve/CVE-2024-4060.html
https://www.suse.com/security/cve/CVE-2024-4331.html
https://www.suse.com/security/cve/CVE-2024-4368.html
https://www.suse.com/security/cve/CVE-2024-4558.html
https://www.suse.com/security/cve/CVE-2024-4559.html
https://www.suse.com/security/cve/CVE-2024-4671.html
https://bugzilla.suse.com/1221732
https://bugzilla.suse.com/1222035
https://bugzilla.suse.com/1222260
https://bugzilla.suse.com/1222707
https://bugzilla.suse.com/1222958
https://bugzilla.suse.com/1223845
https://bugzilla.suse.com/1223846
https://bugzilla.suse.com/1224045