SUSE 5052 Published by

A chromium security update has been released for SUSE Linux Enterprise 15 SP4 and SP5.

openSUSE-SU-2023:0387-1: important: Security update for chromium

openSUSE Security Update: Security update for chromium

Announcement ID: openSUSE-SU-2023:0387-1
Rating: important
References: #1217614 #1217615 #1217616
Cross-References: CVE-2023-6345 CVE-2023-6346 CVE-2023-6347
CVE-2023-6348 CVE-2023-6350 CVE-2023-6351

Affected Products:
openSUSE Backports SLE-15-SP4
openSUSE Backports SLE-15-SP5

An update that fixes 6 vulnerabilities is now available.


This update for Chromium fixes the following issue:

Chromium 119.0.6045.199 (boo#1217616)

* CVE-2023-6348: Type Confusion in Spellcheck
* CVE-2023-6347: Use after free in Mojo
* CVE-2023-6346: Use after free in WebAudio
* CVE-2023-6350: Out of bounds memory access in libavif (boo#1217614)
* CVE-2023-6351: Use after free in libavif (boo#1217615)
* CVE-2023-6345: Integer overflow in Skia
* Various fixes from internal audits, fuzzing and other initiatives.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP5:

zypper in -t patch openSUSE-2023-387=1

- openSUSE Backports SLE-15-SP4:

zypper in -t patch openSUSE-2023-387=1

Package List:

- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):


- openSUSE Backports SLE-15-SP4 (aarch64 x86_64):