Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-0457 (GCVE-0-2022-0457)
Vulnerability from cvelistv5 – Published: 2022-04-05 00:51 – Updated: 2024-08-02 23:25- Type Confusion
| URL | Tags |
|---|---|
| https://chromereleases.googleblog.com/2022/02/sta… | x_refsource_MISC |
| https://crbug.com/1274445 | x_refsource_MISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:25:40.461Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://crbug.com/1274445"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "98.0.4758.80",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Type Confusion",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-05T00:51:20.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://crbug.com/1274445"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2022-0457",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "98.0.4758.80"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Type Confusion"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1274445",
"refsource": "MISC",
"url": "https://crbug.com/1274445"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2022-0457",
"datePublished": "2022-04-05T00:51:20.000Z",
"dateReserved": "2022-02-01T00:00:00.000Z",
"dateUpdated": "2024-08-02T23:25:40.461Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-0457",
"date": "2026-05-20",
"epss": "0.00292",
"percentile": "0.52666"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"98.0.4758.80\", \"matchCriteriaId\": \"585D9A19-7795-4FCB-BB5B-79D5E3E5552C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"}, {\"lang\": \"es\", \"value\": \"Una confusi\\u00f3n de tipo en V8 en Google Chrome versiones anteriores a 98.0.4758.80, permit\\u00eda a un atacante remoto explotar potencialmente una corrupci\\u00f3n de la pila por medio de una p\\u00e1gina HTML dise\\u00f1ada\"}]",
"id": "CVE-2022-0457",
"lastModified": "2024-11-21T06:38:39.823",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-04-05T01:15:08.037",
"references": "[{\"url\": \"https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1274445\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1274445\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-843\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-0457\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2022-04-05T01:15:08.037\",\"lastModified\":\"2024-11-21T06:38:39.823\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Una confusi\u00f3n de tipo en V8 en Google Chrome versiones anteriores a 98.0.4758.80, permit\u00eda a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"98.0.4758.80\",\"matchCriteriaId\":\"585D9A19-7795-4FCB-BB5B-79D5E3E5552C\"}]}]}],\"references\":[{\"url\":\"https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1274445\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1274445\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2022-AVI-105
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 98.0.4758.82 pour Windows",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
},
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 98.0.4758.80 pour Mac et Linux",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0461"
},
{
"name": "CVE-2022-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0467"
},
{
"name": "CVE-2022-0470",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0470"
},
{
"name": "CVE-2022-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0452"
},
{
"name": "CVE-2022-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0466"
},
{
"name": "CVE-2022-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0459"
},
{
"name": "CVE-2022-0457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0457"
},
{
"name": "CVE-2022-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0460"
},
{
"name": "CVE-2022-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0468"
},
{
"name": "CVE-2022-0462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0462"
},
{
"name": "CVE-2022-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0469"
},
{
"name": "CVE-2022-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0453"
},
{
"name": "CVE-2022-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0464"
},
{
"name": "CVE-2022-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0458"
},
{
"name": "CVE-2022-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0465"
},
{
"name": "CVE-2022-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0456"
},
{
"name": "CVE-2022-0454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0454"
},
{
"name": "CVE-2022-0455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0455"
},
{
"name": "CVE-2022-0463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0463"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-105",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome du 01 f\u00e9vrier 2022",
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2022-AVI-110
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 98.0.1108.43 bas\u00e9e sur Chromium version 98.0.4758.80",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0461"
},
{
"name": "CVE-2022-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0467"
},
{
"name": "CVE-2022-23263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23263"
},
{
"name": "CVE-2022-0470",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0470"
},
{
"name": "CVE-2022-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0452"
},
{
"name": "CVE-2022-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0466"
},
{
"name": "CVE-2022-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0459"
},
{
"name": "CVE-2022-0457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0457"
},
{
"name": "CVE-2022-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0460"
},
{
"name": "CVE-2022-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0468"
},
{
"name": "CVE-2022-0462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0462"
},
{
"name": "CVE-2022-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0469"
},
{
"name": "CVE-2022-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0453"
},
{
"name": "CVE-2022-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0464"
},
{
"name": "CVE-2022-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0458"
},
{
"name": "CVE-2022-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0465"
},
{
"name": "CVE-2022-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0456"
},
{
"name": "CVE-2022-0454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0454"
},
{
"name": "CVE-2022-23261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23261"
},
{
"name": "CVE-2022-0455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0455"
},
{
"name": "CVE-2022-0463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0463"
},
{
"name": "CVE-2022-23262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23262"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-110",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0456 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0456"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0461 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0461"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 23261 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23261"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0464 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0464"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0470 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0470"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0455 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0455"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0467 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0467"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0465 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0465"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0458 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0458"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0459 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0459"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0460 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0460"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 23263 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23263"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0462 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0462"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0452 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0452"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0454 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0454"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0468 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0468"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0453 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0453"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 23262 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23262"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0457 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0457"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0463 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0463"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0469 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0469"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0466 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0466"
}
]
}
CERTFR-2022-AVI-105
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 98.0.4758.82 pour Windows",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
},
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 98.0.4758.80 pour Mac et Linux",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0461"
},
{
"name": "CVE-2022-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0467"
},
{
"name": "CVE-2022-0470",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0470"
},
{
"name": "CVE-2022-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0452"
},
{
"name": "CVE-2022-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0466"
},
{
"name": "CVE-2022-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0459"
},
{
"name": "CVE-2022-0457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0457"
},
{
"name": "CVE-2022-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0460"
},
{
"name": "CVE-2022-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0468"
},
{
"name": "CVE-2022-0462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0462"
},
{
"name": "CVE-2022-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0469"
},
{
"name": "CVE-2022-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0453"
},
{
"name": "CVE-2022-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0464"
},
{
"name": "CVE-2022-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0458"
},
{
"name": "CVE-2022-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0465"
},
{
"name": "CVE-2022-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0456"
},
{
"name": "CVE-2022-0454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0454"
},
{
"name": "CVE-2022-0455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0455"
},
{
"name": "CVE-2022-0463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0463"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-105",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome du 01 f\u00e9vrier 2022",
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2022-AVI-110
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 98.0.1108.43 bas\u00e9e sur Chromium version 98.0.4758.80",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0461"
},
{
"name": "CVE-2022-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0467"
},
{
"name": "CVE-2022-23263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23263"
},
{
"name": "CVE-2022-0470",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0470"
},
{
"name": "CVE-2022-0452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0452"
},
{
"name": "CVE-2022-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0466"
},
{
"name": "CVE-2022-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0459"
},
{
"name": "CVE-2022-0457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0457"
},
{
"name": "CVE-2022-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0460"
},
{
"name": "CVE-2022-0468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0468"
},
{
"name": "CVE-2022-0462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0462"
},
{
"name": "CVE-2022-0469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0469"
},
{
"name": "CVE-2022-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0453"
},
{
"name": "CVE-2022-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0464"
},
{
"name": "CVE-2022-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0458"
},
{
"name": "CVE-2022-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0465"
},
{
"name": "CVE-2022-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0456"
},
{
"name": "CVE-2022-0454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0454"
},
{
"name": "CVE-2022-23261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23261"
},
{
"name": "CVE-2022-0455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0455"
},
{
"name": "CVE-2022-0463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0463"
},
{
"name": "CVE-2022-23262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23262"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-110",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0456 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0456"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0461 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0461"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 23261 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23261"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0464 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0464"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0470 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0470"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0455 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0455"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0467 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0467"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0465 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0465"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0458 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0458"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0459 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0459"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0460 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0460"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 23263 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23263"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0462 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0462"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0452 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0452"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0454 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0454"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0468 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0468"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0453 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0453"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 23262 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23262"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0457 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0457"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0463 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0463"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0469 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0469"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 0466 du 03 f\u00e9vrier 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0466"
}
]
}
BDU:2022-00812
Vulnerability from fstec - Published: 01.02.2022{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Google Inc, Microsoft Corp, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 1.7 (Astra Linux Special Edition), \u0434\u043e 98.0.4758.80 (Google Chrome), \u0434\u043e 98.0.1108.43 (Microsoft Edge), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.4.3 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Google Chrome:\nhttps://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html\n\n\u0414\u043b\u044f Microsoft Edge:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0457\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 99.0.4844.74+repack-1osnova1\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7 (\u0434\u043b\u044f \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b ARM):\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets\n\n",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "01.02.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "03.04.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "16.02.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-00812",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-0457",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Google Chrome, Microsoft Edge, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430 JavaScript-\u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0435\u0432 V8 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0431\u043e\u0439\u0442\u0438 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0414\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0443 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u044b\u0435 \u0442\u0438\u043f\u044b (CWE-843)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430 JavaScript-\u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0435\u0432 V8 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0443 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u044b\u0435 \u0442\u0438\u043f\u044b. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043e\u0431\u043e\u0439\u0442\u0438 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0457\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-0819SE17\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.4.3/\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0926SE47\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.5/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-843",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,3)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2022-45565
Vulnerability from cnvd - Published: 2022-06-16厂商已发布了漏洞修复程序,请及时关注更新: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0457
| Name | Google Chrome <98.0.4758.80 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-0457",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-0457"
}
},
"description": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002\n\nGoogle Chrome\u5b58\u5728\u7c7b\u578b\u6df7\u6dc6\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7cbe\u5fc3\u8bbe\u8ba1\u7684HTML\u9875\u9762\u6f5c\u5728\u5730\u5229\u7528\u5806\u635f\u574f\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-0457",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-45565",
"openTime": "2022-06-16",
"patchDescription": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002\r\n\r\nGoogle Chrome\u5b58\u5728\u7c7b\u578b\u6df7\u6dc6\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7cbe\u5fc3\u8bbe\u8ba1\u7684HTML\u9875\u9762\u6f5c\u5728\u5730\u5229\u7528\u5806\u635f\u574f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Chrome\u7c7b\u578b\u6df7\u6dc6\u6f0f\u6d1e\uff08CNVD-2022-45565\uff09\u7684\u8865\u4e01",
"products": {
"product": "Google Chrome \u003c98.0.4758.80"
},
"referenceLink": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0457",
"serverity": "\u4e2d",
"submitTime": "2022-02-10",
"title": "Google Chrome\u7c7b\u578b\u6df7\u6dc6\u6f0f\u6d1e\uff08CNVD-2022-45565\uff09"
}
FKIE_CVE-2022-0457
Vulnerability from fkie_nvd - Published: 2022-04-05 01:15 - Updated: 2024-11-21 06:38| URL | Tags | ||
|---|---|---|---|
| chrome-cve-admin@google.com | https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html | Vendor Advisory | |
| chrome-cve-admin@google.com | https://crbug.com/1274445 | Issue Tracking, Permissions Required, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://crbug.com/1274445 | Issue Tracking, Permissions Required, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "585D9A19-7795-4FCB-BB5B-79D5E3E5552C",
"versionEndExcluding": "98.0.4758.80",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
},
{
"lang": "es",
"value": "Una confusi\u00f3n de tipo en V8 en Google Chrome versiones anteriores a 98.0.4758.80, permit\u00eda a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada"
}
],
"id": "CVE-2022-0457",
"lastModified": "2024-11-21T06:38:39.823",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-04-05T01:15:08.037",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1274445"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1274445"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-JG9W-WM2G-X7H3
Vulnerability from github – Published: 2022-04-06 00:01 – Updated: 2022-04-12 00:00Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
{
"affected": [],
"aliases": [
"CVE-2022-0457"
],
"database_specific": {
"cwe_ids": [
"CWE-843"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-04-05T01:15:00Z",
"severity": "HIGH"
},
"details": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GHSA-jg9w-wm2g-x7h3",
"modified": "2022-04-12T00:00:47Z",
"published": "2022-04-06T00:01:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0457"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"type": "WEB",
"url": "https://crbug.com/1274445"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-0457
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-0457",
"description": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2022-0457",
"references": [
"https://www.suse.com/security/cve/CVE-2022-0457.html",
"https://www.debian.org/security/2022/dsa-5068"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-0457"
],
"details": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2022-0457",
"modified": "2023-12-13T01:19:11.303626Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2022-0457",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "98.0.4758.80"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Type Confusion"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1274445",
"refsource": "MISC",
"url": "https://crbug.com/1274445"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "98.0.4758.80",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2022-0457"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://crbug.com/1274445",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1274445"
},
{
"name": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-04-11T09:36Z",
"publishedDate": "2022-04-05T01:15Z"
}
}
}
OPENSUSE-SU-2022:0030-1
Vulnerability from csaf_opensuse - Published: 2022-02-07 09:29 - Updated: 2022-02-07 09:29| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1195420 | self |
| https://www.suse.com/security/cve/CVE-2022-0452/ | self |
| https://www.suse.com/security/cve/CVE-2022-0453/ | self |
| https://www.suse.com/security/cve/CVE-2022-0454/ | self |
| https://www.suse.com/security/cve/CVE-2022-0455/ | self |
| https://www.suse.com/security/cve/CVE-2022-0456/ | self |
| https://www.suse.com/security/cve/CVE-2022-0457/ | self |
| https://www.suse.com/security/cve/CVE-2022-0459/ | self |
| https://www.suse.com/security/cve/CVE-2022-0460/ | self |
| https://www.suse.com/security/cve/CVE-2022-0461/ | self |
| https://www.suse.com/security/cve/CVE-2022-0462/ | self |
| https://www.suse.com/security/cve/CVE-2022-0463/ | self |
| https://www.suse.com/security/cve/CVE-2022-0464/ | self |
| https://www.suse.com/security/cve/CVE-2022-0465/ | self |
| https://www.suse.com/security/cve/CVE-2022-0466/ | self |
| https://www.suse.com/security/cve/CVE-2022-0467/ | self |
| https://www.suse.com/security/cve/CVE-2022-0468/ | self |
| https://www.suse.com/security/cve/CVE-2022-0469/ | self |
| https://www.suse.com/security/cve/CVE-2022-0470/ | self |
| https://www.suse.com/security/cve/CVE-2022-0452 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0453 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0454 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0455 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0456 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0457 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0459 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0460 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0461 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0462 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0463 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0464 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0465 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0466 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0467 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0468 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0469 | external |
| https://bugzilla.suse.com/1195420 | external |
| https://www.suse.com/security/cve/CVE-2022-0470 | external |
| https://bugzilla.suse.com/1195420 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium 98.0.4758.80 (boo#1195420)\n\n* CVE-2022-0452: Use after free in Safe Browsing\n* CVE-2022-0453: Use after free in Reader Mode\n* CVE-2022-0454: Heap buffer overflow in ANGLE\n* CVE-2022-0455: Inappropriate implementation in Full Screen Mode\n* CVE-2022-0456: Use after free in Web Search\n* CVE-2022-0457: Type Confusion in V8\n* CVE-2022-0459: Use after free in Screen Capture\n* CVE-2022-0460: Use after free in Window Dialog\n* CVE-2022-0461: Policy bypass in COOP\n* CVE-2022-0462: Inappropriate implementation in Scroll\n* CVE-2022-0463: Use after free in Accessibility\n* CVE-2022-0464: Use after free in Accessibility\n* CVE-2022-0465: Use after free in Extensions\n* CVE-2022-0466: Inappropriate implementation in Extensions Platform\n* CVE-2022-0467: Inappropriate implementation in Pointer Lock\n* CVE-2022-0468: Use after free in Payments\n* CVE-2022-0469: Use after free in Cast\n* CVE-2022-0470: Out of bounds memory access in V8\n* Various fixes from internal audits, fuzzing and other initiatives\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-30",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0030-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0030-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6WMUXRUC6NZA77FM7TELOXJIMWMOJRMA/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0030-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6WMUXRUC6NZA77FM7TELOXJIMWMOJRMA/"
},
{
"category": "self",
"summary": "SUSE Bug 1195420",
"url": "https://bugzilla.suse.com/1195420"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0452 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0453 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0453/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0454 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0455 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0455/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0456 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0457 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0457/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0459 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0459/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0460 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0460/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0461 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0461/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0462 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0463 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0464 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0465 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0466 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0467 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0467/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0468 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0468/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0469 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0469/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0470 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0470/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2022-02-07T09:29:40Z",
"generator": {
"date": "2022-02-07T09:29:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0030-1",
"initial_release_date": "2022-02-07T09:29:40Z",
"revision_history": [
{
"date": "2022-02-07T09:29:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"product": {
"name": "chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"product_id": "chromedriver-98.0.4758.80-bp153.2.60.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"product": {
"name": "chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"product_id": "chromium-98.0.4758.80-bp153.2.60.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"product": {
"name": "chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"product_id": "chromedriver-98.0.4758.80-bp153.2.60.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"product": {
"name": "chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"product_id": "chromium-98.0.4758.80-bp153.2.60.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP3",
"product": {
"name": "SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64"
},
"product_reference": "chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64"
},
"product_reference": "chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-98.0.4758.80-bp153.2.60.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64"
},
"product_reference": "chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-98.0.4758.80-bp153.2.60.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
},
"product_reference": "chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-98.0.4758.80-bp153.2.60.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64"
},
"product_reference": "chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-98.0.4758.80-bp153.2.60.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64"
},
"product_reference": "chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-98.0.4758.80-bp153.2.60.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64"
},
"product_reference": "chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-98.0.4758.80-bp153.2.60.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
},
"product_reference": "chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0452"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Safe Browsing in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0452",
"url": "https://www.suse.com/security/cve/CVE-2022-0452"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0452",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0452"
},
{
"cve": "CVE-2022-0453",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0453"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Reader Mode in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0453",
"url": "https://www.suse.com/security/cve/CVE-2022-0453"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0453",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0453"
},
{
"cve": "CVE-2022-0454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0454"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in ANGLE in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0454",
"url": "https://www.suse.com/security/cve/CVE-2022-0454"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0454",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0454"
},
{
"cve": "CVE-2022-0455",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0455"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 98.0.4758.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0455",
"url": "https://www.suse.com/security/cve/CVE-2022-0455"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0455",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0455"
},
{
"cve": "CVE-2022-0456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0456"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0456",
"url": "https://www.suse.com/security/cve/CVE-2022-0456"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0456",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0456"
},
{
"cve": "CVE-2022-0457",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0457"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0457",
"url": "https://www.suse.com/security/cve/CVE-2022-0457"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0457",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0457"
},
{
"cve": "CVE-2022-0459",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0459"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Screen Capture in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process and convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0459",
"url": "https://www.suse.com/security/cve/CVE-2022-0459"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0459",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0459"
},
{
"cve": "CVE-2022-0460",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0460"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Window Dialogue in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0460",
"url": "https://www.suse.com/security/cve/CVE-2022-0460"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0460",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0460"
},
{
"cve": "CVE-2022-0461",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0461"
}
],
"notes": [
{
"category": "general",
"text": "Policy bypass in COOP in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to bypass iframe sandbox via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0461",
"url": "https://www.suse.com/security/cve/CVE-2022-0461"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0461",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0461"
},
{
"cve": "CVE-2022-0462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0462"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0462",
"url": "https://www.suse.com/security/cve/CVE-2022-0462"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0462",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0462"
},
{
"cve": "CVE-2022-0463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0463"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0463",
"url": "https://www.suse.com/security/cve/CVE-2022-0463"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0463",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0463"
},
{
"cve": "CVE-2022-0464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0464"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0464",
"url": "https://www.suse.com/security/cve/CVE-2022-0464"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0464",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0464"
},
{
"cve": "CVE-2022-0465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0465"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Extensions in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via user interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0465",
"url": "https://www.suse.com/security/cve/CVE-2022-0465"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0465",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0465"
},
{
"cve": "CVE-2022-0466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0466"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Extensions Platform in Google Chrome prior to 98.0.4758.80 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0466",
"url": "https://www.suse.com/security/cve/CVE-2022-0466"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0466",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0466"
},
{
"cve": "CVE-2022-0467",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0467"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Pointer Lock in Google Chrome on Windows prior to 98.0.4758.80 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0467",
"url": "https://www.suse.com/security/cve/CVE-2022-0467"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0467",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0467"
},
{
"cve": "CVE-2022-0468",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0468"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Payments in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0468",
"url": "https://www.suse.com/security/cve/CVE-2022-0468"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0468",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0468"
},
{
"cve": "CVE-2022-0469",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0469"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Cast in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0469",
"url": "https://www.suse.com/security/cve/CVE-2022-0469"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0469",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0469"
},
{
"cve": "CVE-2022-0470",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0470"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0470",
"url": "https://www.suse.com/security/cve/CVE-2022-0470"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0470",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromedriver-98.0.4758.80-bp153.2.60.1.x86_64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.aarch64",
"openSUSE Leap 15.3:chromium-98.0.4758.80-bp153.2.60.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-07T09:29:40Z",
"details": "critical"
}
],
"title": "CVE-2022-0470"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.