SUSE 5181 Published by

A chromium security update has been released for SUSE Linux Enterprise 15 SP4.



openSUSE-SU-2023:0124-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2023:0124-1
Rating: important
References: #1211843 #1212044
Cross-References: CVE-2023-2929 CVE-2023-2930 CVE-2023-2931
CVE-2023-2932 CVE-2023-2933 CVE-2023-2934
CVE-2023-2935 CVE-2023-2936 CVE-2023-2937
CVE-2023-2938 CVE-2023-2939 CVE-2023-2940
CVE-2023-2941 CVE-2023-3079
CVSS scores:
CVE-2023-2929 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-2930 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-2931 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-2932 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-2933 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-2934 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-2935 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-2936 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-2937 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2023-2938 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2023-2939 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2023-2940 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2023-2941 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Affected Products:
openSUSE Backports SLE-15-SP4
_______________________________

An update that fixes 14 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

- Chromium 114.0.5735.106 (boo#1212044):

* CVE-2023-3079: Type Confusion in V8

- Chromium 114.0.5735.90 (boo#1211843):

* CSS text-wrap: balance is available
* Cookies partitioned by top level site (CHIPS)
* New Popover API

- Security fixes:

* CVE-2023-2929: Out of bounds write in Swiftshader
* CVE-2023-2930: Use after free in Extensions
* CVE-2023-2931: Use after free in PDF
* CVE-2023-2932: Use after free in PDF
* CVE-2023-2933: Use after free in PDF
* CVE-2023-2934: Out of bounds memory access in Mojo
* CVE-2023-2935: Type Confusion in V8
* CVE-2023-2936: Type Confusion in V8
* CVE-2023-2937: Inappropriate implementation in Picture In Picture
* CVE-2023-2938: Inappropriate implementation in Picture In Picture
* CVE-2023-2939: Insufficient data validation in Installer
* CVE-2023-2940: Inappropriate implementation in Downloads
* CVE-2023-2941: Inappropriate implementation in Extensions API

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP4:

zypper in -t patch openSUSE-2023-124=1

Package List:

- openSUSE Backports SLE-15-SP4 (aarch64 x86_64):

chromedriver-114.0.5735.106-bp154.2.90.1
chromium-114.0.5735.106-bp154.2.90.1

References:

https://www.suse.com/security/cve/CVE-2023-2929.html
https://www.suse.com/security/cve/CVE-2023-2930.html
https://www.suse.com/security/cve/CVE-2023-2931.html
https://www.suse.com/security/cve/CVE-2023-2932.html
https://www.suse.com/security/cve/CVE-2023-2933.html
https://www.suse.com/security/cve/CVE-2023-2934.html
https://www.suse.com/security/cve/CVE-2023-2935.html
https://www.suse.com/security/cve/CVE-2023-2936.html
https://www.suse.com/security/cve/CVE-2023-2937.html
https://www.suse.com/security/cve/CVE-2023-2938.html
https://www.suse.com/security/cve/CVE-2023-2939.html
https://www.suse.com/security/cve/CVE-2023-2940.html
https://www.suse.com/security/cve/CVE-2023-2941.html
https://www.suse.com/security/cve/CVE-2023-3079.html
https://bugzilla.suse.com/1211843
https://bugzilla.suse.com/1212044