openSUSE: 2023:0387-1 important: chromium
Description
This update for Chromium fixes the following issue: Chromium 119.0.6045.199 (boo#1217616) * CVE-2023-6348: Type Confusion in Spellcheck * CVE-2023-6347: Use after free in Mojo * CVE-2023-6346: Use after free in WebAudio * CVE-2023-6350: Out of bounds memory access in libavif (boo#1217614) * CVE-2023-6351: Use after free in libavif (boo#1217615) * CVE-2023-6345: Integer overflow in Skia * Various fixes from internal audits, fuzzing and other initiatives.
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Backports SLE-15-SP5: zypper in -t patch openSUSE-2023-387=1 - openSUSE Backports SLE-15-SP4: zypper in -t patch openSUSE-2023-387=1
Package List
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64): chromedriver-119.0.6045.199-bp155.2.61.1 chromedriver-debuginfo-119.0.6045.199-bp155.2.61.1 chromium-119.0.6045.199-bp155.2.61.1 chromium-debuginfo-119.0.6045.199-bp155.2.61.1 - openSUSE Backports SLE-15-SP4 (aarch64 x86_64): chromedriver-119.0.6045.199-bp154.2.147.1 chromium-119.0.6045.199-bp154.2.147.1
References
https://www.suse.com/security/cve/CVE-2023-6345.html https://www.suse.com/security/cve/CVE-2023-6346.html https://www.suse.com/security/cve/CVE-2023-6347.html https://www.suse.com/security/cve/CVE-2023-6348.html https://www.suse.com/security/cve/CVE-2023-6350.html https://www.suse.com/security/cve/CVE-2023-6351.html https://bugzilla.suse.com/1217614 https://bugzilla.suse.com/1217615 https://bugzilla.suse.com/1217616