SUSE 5025 Published by

A chromium security update has been released for SUSE Linux Enterprise 15 SP3.



openSUSE-SU-2022:0014-1: important: Security update for chromium


openSUSE Security Update: Security update for chromium
______________________________________________________________________________

Announcement ID: openSUSE-SU-2022:0014-1
Rating: important
References: #1194055 #1194182 #1194331
Cross-References: CVE-2022-0096 CVE-2022-0097 CVE-2022-0098
CVE-2022-0099 CVE-2022-0100 CVE-2022-0101
CVE-2022-0102 CVE-2022-0103 CVE-2022-0104
CVE-2022-0105 CVE-2022-0106 CVE-2022-0107
CVE-2022-0108 CVE-2022-0109 CVE-2022-0110
CVE-2022-0111 CVE-2022-0112 CVE-2022-0113
CVE-2022-0114 CVE-2022-0115 CVE-2022-0116
CVE-2022-0117 CVE-2022-0118 CVE-2022-0120

Affected Products:
openSUSE Backports SLE-15-SP3
______________________________________________________________________________

An update that fixes 24 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

Chromium 97.0.4692.71 (boo#1194331):

* CVE-2022-0096: Use after free in Storage
* CVE-2022-0097: Inappropriate implementation in DevTools
* CVE-2022-0098: Use after free in Screen Capture
* CVE-2022-0099: Use after free in Sign-in
* CVE-2022-0100: Heap buffer overflow in Media streams API
* CVE-2022-0101: Heap buffer overflow in Bookmarks
* CVE-2022-0102: Type Confusion in V8
* CVE-2022-0103: Use after free in SwiftShader
* CVE-2022-0104: Heap buffer overflow in ANGLE
* CVE-2022-0105: Use after free in PDF
* CVE-2022-0106: Use after free in Autofill
* CVE-2022-0107: Use after free in File Manager API
* CVE-2022-0108: Inappropriate implementation in Navigation
* CVE-2022-0109: Inappropriate implementation in Autofill
* CVE-2022-0110: Incorrect security UI in Autofill
* CVE-2022-0111: Inappropriate implementation in Navigation
* CVE-2022-0112: Incorrect security UI in Browser UI
* CVE-2022-0113: Inappropriate implementation in Blink
* CVE-2022-0114: Out of bounds memory access in Web Serial
* CVE-2022-0115: Uninitialized Use in File API
* CVE-2022-0116: Inappropriate implementation in Compositing
* CVE-2022-0117: Policy bypass in Service Workers
* CVE-2022-0118: Inappropriate implementation in WebShare
* CVE-2022-0120: Inappropriate implementation in Passwords

- Revert wayland fixes because it doesn't handle GPU correctly
(boo#1194182)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP3:

zypper in -t patch openSUSE-2022-14=1


Package List:

- openSUSE Backports SLE-15-SP3 (aarch64 x86_64):

chromedriver-97.0.4692.71-bp153.2.54.1
chromium-97.0.4692.71-bp153.2.54.1

References:

  https://www.suse.com/security/cve/CVE-2022-0096.html
  https://www.suse.com/security/cve/CVE-2022-0097.html
  https://www.suse.com/security/cve/CVE-2022-0098.html
  https://www.suse.com/security/cve/CVE-2022-0099.html
  https://www.suse.com/security/cve/CVE-2022-0100.html
  https://www.suse.com/security/cve/CVE-2022-0101.html
  https://www.suse.com/security/cve/CVE-2022-0102.html
  https://www.suse.com/security/cve/CVE-2022-0103.html
  https://www.suse.com/security/cve/CVE-2022-0104.html
  https://www.suse.com/security/cve/CVE-2022-0105.html
  https://www.suse.com/security/cve/CVE-2022-0106.html
  https://www.suse.com/security/cve/CVE-2022-0107.html
  https://www.suse.com/security/cve/CVE-2022-0108.html
  https://www.suse.com/security/cve/CVE-2022-0109.html
  https://www.suse.com/security/cve/CVE-2022-0110.html
  https://www.suse.com/security/cve/CVE-2022-0111.html
  https://www.suse.com/security/cve/CVE-2022-0112.html
  https://www.suse.com/security/cve/CVE-2022-0113.html
  https://www.suse.com/security/cve/CVE-2022-0114.html
  https://www.suse.com/security/cve/CVE-2022-0115.html
  https://www.suse.com/security/cve/CVE-2022-0116.html
  https://www.suse.com/security/cve/CVE-2022-0117.html
  https://www.suse.com/security/cve/CVE-2022-0118.html
  https://www.suse.com/security/cve/CVE-2022-0120.html
  https://bugzilla.suse.com/1194055
  https://bugzilla.suse.com/1194182
  https://bugzilla.suse.com/1194331