OPENSUSE-SU-2022:0014-1
Vulnerability Summary
Timeline
Description
Security update for chromium This update for chromium fixes the following issues: Chromium 97.0.4692.71 (boo#1194331): * CVE-2022-0096: Use after free in Storage * CVE-2022-0097: Inappropriate implementation in DevTools * CVE-2022-0098: Use after free in Screen Capture * CVE-2022-0099: Use after free in Sign-in * CVE-2022-0100: Heap buffer overflow in Media streams API * CVE-2022-0101: Heap buffer overflow in Bookmarks * CVE-2022-0102: Type Confusion in V8 * CVE-2022-0103: Use after free in SwiftShader * CVE-2022-0104: Heap buffer overflow in ANGLE * CVE-2022-0105: Use after free in PDF * CVE-2022-0106: Use after free in Autofill * CVE-2022-0107: Use after free in File Manager API * CVE-2022-0108: Inappropriate implementation in Navigation * CVE-2022-0109: Inappropriate implementation in Autofill * CVE-2022-0110: Incorrect security UI in Autofill * CVE-2022-0111: Inappropriate implementation in Navigation * CVE-2022-0112: Incorrect security UI in Browser UI * CVE-2022-0113: Inappropriate implementation in Blink * CVE-2022-0114: Out of bounds memory access in Web Serial * CVE-2022-0115: Uninitialized Use in File API * CVE-2022-0116: Inappropriate implementation in Compositing * CVE-2022-0117: Policy bypass in Service Workers * CVE-2022-0118: Inappropriate implementation in WebShare * CVE-2022-0120: Inappropriate implementation in Passwords - Revert wayland fixes because it doesn't handle GPU correctly (boo#1194182)
Affected Systems
- opensuse•chromium&distro=openSUSE Leap 15.3
< 97.0.4692.71-bp153.2.54.1
- suse•chromium&distro=SUSE Package Hub 15 SP3
< 97.0.4692.71-bp153.2.54.1
References (28)
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XW7HD7EA7DNOWMGKDOA6BCE6FBFET4WB/
- https://bugzilla.suse.com/1194055
- https://bugzilla.suse.com/1194182
- https://bugzilla.suse.com/1194331
- https://www.suse.com/security/cve/CVE-2022-0096
- https://www.suse.com/security/cve/CVE-2022-0097
- https://www.suse.com/security/cve/CVE-2022-0098
- https://www.suse.com/security/cve/CVE-2022-0099
- https://www.suse.com/security/cve/CVE-2022-0100
- https://www.suse.com/security/cve/CVE-2022-0101
- https://www.suse.com/security/cve/CVE-2022-0102
- https://www.suse.com/security/cve/CVE-2022-0103
- https://www.suse.com/security/cve/CVE-2022-0104
- https://www.suse.com/security/cve/CVE-2022-0105
- https://www.suse.com/security/cve/CVE-2022-0106
- https://www.suse.com/security/cve/CVE-2022-0107
- https://www.suse.com/security/cve/CVE-2022-0108
- https://www.suse.com/security/cve/CVE-2022-0109
- https://www.suse.com/security/cve/CVE-2022-0110
- https://www.suse.com/security/cve/CVE-2022-0111
- https://www.suse.com/security/cve/CVE-2022-0112
- https://www.suse.com/security/cve/CVE-2022-0113
- https://www.suse.com/security/cve/CVE-2022-0114
- https://www.suse.com/security/cve/CVE-2022-0115
- https://www.suse.com/security/cve/CVE-2022-0116
- https://www.suse.com/security/cve/CVE-2022-0117
- https://www.suse.com/security/cve/CVE-2022-0118
- https://www.suse.com/security/cve/CVE-2022-0120