SUSE 5180 Published by

A chromium security update has been released for SUSE Linux Enterprise 15 SP3.



openSUSE-SU-2022:0019-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2022:0019-1
Rating: important
References: #1194919
Cross-References: CVE-2022-0289 CVE-2022-0290 CVE-2022-0291
CVE-2022-0292 CVE-2022-0293 CVE-2022-0294
CVE-2022-0295 CVE-2022-0296 CVE-2022-0297
CVE-2022-0298 CVE-2022-0300 CVE-2022-0301
CVE-2022-0302 CVE-2022-0303 CVE-2022-0304
CVE-2022-0305 CVE-2022-0306 CVE-2022-0307
CVE-2022-0308 CVE-2022-0309 CVE-2022-0310
CVE-2022-0311
Affected Products:
openSUSE Backports SLE-15-SP3
______________________________________________________________________________

An update that fixes 22 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

Chromium 97.0.4692.99 (boo#1194919):

* CVE-2022-0289: Use after free in Safe browsing
* CVE-2022-0290: Use after free in Site isolation
* CVE-2022-0291: Inappropriate implementation in Storage
* CVE-2022-0292: Inappropriate implementation in Fenced Frames
* CVE-2022-0293: Use after free in Web packaging
* CVE-2022-0294: Inappropriate implementation in Push messaging
* CVE-2022-0295: Use after free in Omnibox
* CVE-2022-0296: Use after free in Printing
* CVE-2022-0297: Use after free in Vulkan
* CVE-2022-0298: Use after free in Scheduling
* CVE-2022-0300: Use after free in Text Input Method Editor
* CVE-2022-0301: Heap buffer overflow in DevTools
* CVE-2022-0302: Use after free in Omnibox
* CVE-2022-0303: Race in GPU Watchdog
* CVE-2022-0304: Use after free in Bookmarks
* CVE-2022-0305: Inappropriate implementation in Service Worker API
* CVE-2022-0306: Heap buffer overflow in PDFium
* CVE-2022-0307: Use after free in Optimization Guide
* CVE-2022-0308: Use after free in Data Transfer
* CVE-2022-0309: Inappropriate implementation in Autofill
* CVE-2022-0310: Heap buffer overflow in Task Manager
* CVE-2022-0311: Heap buffer overflow in Task Manager

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP3:

zypper in -t patch openSUSE-2022-19=1


Package List:

- openSUSE Backports SLE-15-SP3 (aarch64 x86_64):

chromedriver-97.0.4692.99-bp153.2.57.1
chromium-97.0.4692.99-bp153.2.57.1

References:

  https://www.suse.com/security/cve/CVE-2022-0289.html
  https://www.suse.com/security/cve/CVE-2022-0290.html
  https://www.suse.com/security/cve/CVE-2022-0291.html
  https://www.suse.com/security/cve/CVE-2022-0292.html
  https://www.suse.com/security/cve/CVE-2022-0293.html
  https://www.suse.com/security/cve/CVE-2022-0294.html
  https://www.suse.com/security/cve/CVE-2022-0295.html
  https://www.suse.com/security/cve/CVE-2022-0296.html
  https://www.suse.com/security/cve/CVE-2022-0297.html
  https://www.suse.com/security/cve/CVE-2022-0298.html
  https://www.suse.com/security/cve/CVE-2022-0300.html
  https://www.suse.com/security/cve/CVE-2022-0301.html
  https://www.suse.com/security/cve/CVE-2022-0302.html
  https://www.suse.com/security/cve/CVE-2022-0303.html
  https://www.suse.com/security/cve/CVE-2022-0304.html
  https://www.suse.com/security/cve/CVE-2022-0305.html
  https://www.suse.com/security/cve/CVE-2022-0306.html
  https://www.suse.com/security/cve/CVE-2022-0307.html
  https://www.suse.com/security/cve/CVE-2022-0308.html
  https://www.suse.com/security/cve/CVE-2022-0309.html
  https://www.suse.com/security/cve/CVE-2022-0310.html
  https://www.suse.com/security/cve/CVE-2022-0311.html
  https://bugzilla.suse.com/1194919