[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-OPENSUSE-SU-2022:0014-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":62,"duplicates":63,"related":64,"reserved_at":9,"published_at":89,"modified_at":90,"state":9,"summary":91,"references_raw":93,"kevs":211,"epss":9,"epss_history":212,"metrics":213,"affected":214},"OPENSUSE-SU-2022:0014-1","Security update for chromium\n\nThis update for chromium fixes the following issues:\n\nChromium 97.0.4692.71 (boo#1194331):\n\n* CVE-2022-0096: Use after free in Storage\n* CVE-2022-0097: Inappropriate implementation in DevTools\n* CVE-2022-0098: Use after free in Screen Capture\n* CVE-2022-0099: Use after free in Sign-in\n* CVE-2022-0100: Heap buffer overflow in Media streams API\n* CVE-2022-0101: Heap buffer overflow in Bookmarks\n* CVE-2022-0102: Type Confusion in V8\n* CVE-2022-0103: Use after free in SwiftShader\n* CVE-2022-0104: Heap buffer overflow in ANGLE\n* CVE-2022-0105: Use after free in PDF\n* CVE-2022-0106: Use after free in Autofill\n* CVE-2022-0107: Use after free in File Manager API\n* CVE-2022-0108: Inappropriate implementation in Navigation\n* CVE-2022-0109: Inappropriate implementation in Autofill\n* CVE-2022-0110: Incorrect security UI in Autofill\n* CVE-2022-0111: Inappropriate implementation in Navigation\n* CVE-2022-0112: Incorrect security UI in Browser UI\n* CVE-2022-0113: Inappropriate implementation in Blink\n* CVE-2022-0114: Out of bounds memory access in Web Serial\n* CVE-2022-0115: Uninitialized Use in File API\n* CVE-2022-0116: Inappropriate implementation in Compositing\n* CVE-2022-0117: Policy bypass in Service Workers\n* CVE-2022-0118: Inappropriate implementation in WebShare\n* CVE-2022-0120: Inappropriate implementation in Passwords\n\n- Revert wayland fixes because it doesn't handle GPU correctly\n  (boo#1194182)\n\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48,50,52,54,56,58,60],{"_key":15},"CVE-2022-0096",{"_key":17},"CVE-2022-0097",{"_key":19},"CVE-2022-0098",{"_key":21},"CVE-2022-0099",{"_key":23},"CVE-2022-0100",{"_key":25},"CVE-2022-0101",{"_key":27},"CVE-2022-0102",{"_key":29},"CVE-2022-0103",{"_key":31},"CVE-2022-0104",{"_key":33},"CVE-2022-0105",{"_key":35},"CVE-2022-0106",{"_key":37},"CVE-2022-0107",{"_key":39},"CVE-2022-0108",{"_key":41},"CVE-2022-0109",{"_key":43},"CVE-2022-0110",{"_key":45},"CVE-2022-0111",{"_key":47},"CVE-2022-0112",{"_key":49},"CVE-2022-0113",{"_key":51},"CVE-2022-0114",{"_key":53},"CVE-2022-0115",{"_key":55},"CVE-2022-0116",{"_key":57},"CVE-2022-0117",{"_key":59},"CVE-2022-0118",{"_key":61},"CVE-2022-0120",[],[],[65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},{"_key":43},{"_key":45},{"_key":47},{"_key":49},{"_key":51},{"_key":53},{"_key":55},{"_key":57},{"_key":59},{"_key":61},"2022-01-17T09:35:20Z","2026-02-04T04:35:02.068469Z",{"cisa_kev":92,"cisa_ransomware":92,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[94,101,106,110,114,119,123,127,131,135,139,143,147,151,155,159,163,167,171,175,179,183,187,191,195,199,203,207],{"url":95,"sources":96,"tags":99},"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XW7HD7EA7DNOWMGKDOA6BCE6FBFET4WB/",[97,98],"osv_suse","osv_opensuse",[100],"Advisory",{"url":102,"sources":103,"tags":104},"https://bugzilla.suse.com/1194055",[97,98],[105],"REPORT",{"url":107,"sources":108,"tags":109},"https://bugzilla.suse.com/1194182",[97,98],[105],{"url":111,"sources":112,"tags":113},"https://bugzilla.suse.com/1194331",[97,98],[105],{"url":115,"sources":116,"tags":117},"https://www.suse.com/security/cve/CVE-2022-0096",[97,98],[118],"WEB",{"url":120,"sources":121,"tags":122},"https://www.suse.com/security/cve/CVE-2022-0097",[97,98],[118],{"url":124,"sources":125,"tags":126},"https://www.suse.com/security/cve/CVE-2022-0098",[97,98],[118],{"url":128,"sources":129,"tags":130},"https://www.suse.com/security/cve/CVE-2022-0099",[97,98],[118],{"url":132,"sources":133,"tags":134},"https://www.suse.com/security/cve/CVE-2022-0100",[97,98],[118],{"url":136,"sources":137,"tags":138},"https://www.suse.com/security/cve/CVE-2022-0101",[97,98],[118],{"url":140,"sources":141,"tags":142},"https://www.suse.com/security/cve/CVE-2022-0102",[97,98],[118],{"url":144,"sources":145,"tags":146},"https://www.suse.com/security/cve/CVE-2022-0103",[97,98],[118],{"url":148,"sources":149,"tags":150},"https://www.suse.com/security/cve/CVE-2022-0104",[97,98],[118],{"url":152,"sources":153,"tags":154},"https://www.suse.com/security/cve/CVE-2022-0105",[97,98],[118],{"url":156,"sources":157,"tags":158},"https://www.suse.com/security/cve/CVE-2022-0106",[97,98],[118],{"url":160,"sources":161,"tags":162},"https://www.suse.com/security/cve/CVE-2022-0107",[97,98],[118],{"url":164,"sources":165,"tags":166},"https://www.suse.com/security/cve/CVE-2022-0108",[97,98],[118],{"url":168,"sources":169,"tags":170},"https://www.suse.com/security/cve/CVE-2022-0109",[97,98],[118],{"url":172,"sources":173,"tags":174},"https://www.suse.com/security/cve/CVE-2022-0110",[97,98],[118],{"url":176,"sources":177,"tags":178},"https://www.suse.com/security/cve/CVE-2022-0111",[97,98],[118],{"url":180,"sources":181,"tags":182},"https://www.suse.com/security/cve/CVE-2022-0112",[97,98],[118],{"url":184,"sources":185,"tags":186},"https://www.suse.com/security/cve/CVE-2022-0113",[97,98],[118],{"url":188,"sources":189,"tags":190},"https://www.suse.com/security/cve/CVE-2022-0114",[97,98],[118],{"url":192,"sources":193,"tags":194},"https://www.suse.com/security/cve/CVE-2022-0115",[97,98],[118],{"url":196,"sources":197,"tags":198},"https://www.suse.com/security/cve/CVE-2022-0116",[97,98],[118],{"url":200,"sources":201,"tags":202},"https://www.suse.com/security/cve/CVE-2022-0117",[97,98],[118],{"url":204,"sources":205,"tags":206},"https://www.suse.com/security/cve/CVE-2022-0118",[97,98],[118],{"url":208,"sources":209,"tags":210},"https://www.suse.com/security/cve/CVE-2022-0120",[97,98],[118],[],[],[],[215,228],{"ecosystem":216,"name":217,"vendor":218,"product":219,"cpe_part":9,"purl_type":220,"purl_namespace":218,"purl_name":219,"source":9,"versions":221},"openSUSE","chromium","opensuse","chromium&distro=openSUSE Leap 15.3","rpm",[222],{"version":223,"is_range":224,"range_type":225,"version_start":9,"version_start_type":9,"version_end":226,"version_end_type":227,"fixed_in":9},"lt97_0_4692_71_bp153_2_54_1",true,"ecosystem","97.0.4692.71-bp153.2.54.1","excluding",{"ecosystem":229,"name":217,"vendor":230,"product":231,"cpe_part":9,"purl_type":220,"purl_namespace":230,"purl_name":231,"source":9,"versions":232},"SUSE Linux Enterprise","suse","chromium&distro=SUSE Package Hub 15 SP3",[233],{"version":223,"is_range":224,"range_type":225,"version_start":9,"version_start_type":9,"version_end":226,"version_end_type":227,"fixed_in":9}]