Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-2621 (GCVE-0-2022-2621)
Vulnerability from cvelistv5 – Published: 2022-08-12 19:37 – Updated: 2024-08-03 00:46- Use after free
| URL | Tags |
|---|---|
| https://chromereleases.googleblog.com/2022/08/sta… | x_refsource_MISC |
| https://crbug.com/1323449 | x_refsource_MISC |
| https://security.gentoo.org/glsa/202208-35 | vendor-advisoryx_refsource_GENTOO |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T00:46:03.265Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://crbug.com/1323449"
},
{
"name": "GLSA-202208-35",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"name": "FEDORA-2022-3f28aa88cf",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "104.0.5112.79",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use after free",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-10-03T01:07:06.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://crbug.com/1323449"
},
{
"name": "GLSA-202208-35",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"name": "FEDORA-2022-3f28aa88cf",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2022-2621",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "104.0.5112.79"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1323449",
"refsource": "MISC",
"url": "https://crbug.com/1323449"
},
{
"name": "GLSA-202208-35",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"name": "FEDORA-2022-3f28aa88cf",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2022-2621",
"datePublished": "2022-08-12T19:37:38.000Z",
"dateReserved": "2022-08-02T00:00:00.000Z",
"dateUpdated": "2024-08-03T00:46:03.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-2621",
"date": "2026-05-19",
"epss": "0.00176",
"percentile": "0.38599"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"104.0.5112.79\", \"matchCriteriaId\": \"F6D91985-7B58-466C-824B-6658D70D21D4\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.\"}, {\"lang\": \"es\", \"value\": \"Un uso de la memoria previamente liberada en Extensions en Google Chrome versiones anteriores a 104.0.5112.79, permit\\u00eda a un atacante que convenciera a un usuario de instalar una extensi\\u00f3n maliciosa explotar potencialmente la corrupci\\u00f3n de la pila por medio de interacciones de Interfaz de Usuario espec\\u00edficas.\"}]",
"id": "CVE-2022-2621",
"lastModified": "2024-11-21T07:01:22.497",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2022-08-12T20:15:09.360",
"references": "[{\"url\": \"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://crbug.com/1323449\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202208-35\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://crbug.com/1323449\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202208-35\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-2621\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2022-08-12T20:15:09.360\",\"lastModified\":\"2024-11-21T07:01:22.497\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.\"},{\"lang\":\"es\",\"value\":\"Un uso de la memoria previamente liberada en Extensions en Google Chrome versiones anteriores a 104.0.5112.79, permit\u00eda a un atacante que convenciera a un usuario de instalar una extensi\u00f3n maliciosa explotar potencialmente la corrupci\u00f3n de la pila por medio de interacciones de Interfaz de Usuario espec\u00edficas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"104.0.5112.79\",\"matchCriteriaId\":\"F6D91985-7B58-466C-824B-6658D70D21D4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}]}]}],\"references\":[{\"url\":\"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://crbug.com/1323449\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-35\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://crbug.com/1323449\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-35\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2022-AVI-702
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Chrome versions ant\u00e9rieures \u00e0 104.0.5112.79 (Mac / Linux)",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
},
{
"description": "Chrome versions ant\u00e9rieures \u00e0 104.0.5112.79/80/81 (Windows)",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2621"
},
{
"name": "CVE-2022-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2603"
},
{
"name": "CVE-2022-2608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2608"
},
{
"name": "CVE-2022-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2605"
},
{
"name": "CVE-2022-2611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2611"
},
{
"name": "CVE-2022-2604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2604"
},
{
"name": "CVE-2022-2615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2615"
},
{
"name": "CVE-2022-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2617"
},
{
"name": "CVE-2022-2612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2612"
},
{
"name": "CVE-2022-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2606"
},
{
"name": "CVE-2022-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2607"
},
{
"name": "CVE-2022-2613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2613"
},
{
"name": "CVE-2022-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2620"
},
{
"name": "CVE-2022-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2619"
},
{
"name": "CVE-2022-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2610"
},
{
"name": "CVE-2022-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2609"
},
{
"name": "CVE-2022-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2624"
},
{
"name": "CVE-2022-2622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2622"
},
{
"name": "CVE-2022-2616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2616"
},
{
"name": "CVE-2022-2614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2614"
},
{
"name": "CVE-2022-2618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2618"
},
{
"name": "CVE-2022-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2623"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-702",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome du 02 ao\u00fbt 2022",
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2022-AVI-713
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge version ant\u00e9rieures \u00e0 104.0.1293.47",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-33636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33636"
},
{
"name": "CVE-2022-2621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2621"
},
{
"name": "CVE-2022-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2603"
},
{
"name": "CVE-2022-33649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33649"
},
{
"name": "CVE-2022-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2605"
},
{
"name": "CVE-2022-2611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2611"
},
{
"name": "CVE-2022-2604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2604"
},
{
"name": "CVE-2022-2615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2615"
},
{
"name": "CVE-2022-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2617"
},
{
"name": "CVE-2022-2612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2612"
},
{
"name": "CVE-2022-35796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35796"
},
{
"name": "CVE-2022-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2606"
},
{
"name": "CVE-2022-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2619"
},
{
"name": "CVE-2022-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2610"
},
{
"name": "CVE-2022-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2624"
},
{
"name": "CVE-2022-2622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2622"
},
{
"name": "CVE-2022-2616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2616"
},
{
"name": "CVE-2022-2614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2614"
},
{
"name": "CVE-2022-2618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2618"
},
{
"name": "CVE-2022-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2623"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-713",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2619 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2619"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2621 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2621"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2605 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2605"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2611 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2611"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2623 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2623"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2610 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2610"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2618 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2618"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-35796 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35796"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2615 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2615"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2606 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2606"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2622 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2622"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33649 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33649"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2604 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2612 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2612"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2616 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2616"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2603 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2603"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2614 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2614"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2624 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2624"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2617 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2617"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33636 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33636"
}
]
}
CERTFR-2022-AVI-702
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Chrome versions ant\u00e9rieures \u00e0 104.0.5112.79 (Mac / Linux)",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
},
{
"description": "Chrome versions ant\u00e9rieures \u00e0 104.0.5112.79/80/81 (Windows)",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2621"
},
{
"name": "CVE-2022-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2603"
},
{
"name": "CVE-2022-2608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2608"
},
{
"name": "CVE-2022-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2605"
},
{
"name": "CVE-2022-2611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2611"
},
{
"name": "CVE-2022-2604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2604"
},
{
"name": "CVE-2022-2615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2615"
},
{
"name": "CVE-2022-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2617"
},
{
"name": "CVE-2022-2612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2612"
},
{
"name": "CVE-2022-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2606"
},
{
"name": "CVE-2022-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2607"
},
{
"name": "CVE-2022-2613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2613"
},
{
"name": "CVE-2022-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2620"
},
{
"name": "CVE-2022-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2619"
},
{
"name": "CVE-2022-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2610"
},
{
"name": "CVE-2022-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2609"
},
{
"name": "CVE-2022-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2624"
},
{
"name": "CVE-2022-2622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2622"
},
{
"name": "CVE-2022-2616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2616"
},
{
"name": "CVE-2022-2614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2614"
},
{
"name": "CVE-2022-2618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2618"
},
{
"name": "CVE-2022-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2623"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-702",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome du 02 ao\u00fbt 2022",
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2022-AVI-713
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge version ant\u00e9rieures \u00e0 104.0.1293.47",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-33636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33636"
},
{
"name": "CVE-2022-2621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2621"
},
{
"name": "CVE-2022-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2603"
},
{
"name": "CVE-2022-33649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33649"
},
{
"name": "CVE-2022-2605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2605"
},
{
"name": "CVE-2022-2611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2611"
},
{
"name": "CVE-2022-2604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2604"
},
{
"name": "CVE-2022-2615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2615"
},
{
"name": "CVE-2022-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2617"
},
{
"name": "CVE-2022-2612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2612"
},
{
"name": "CVE-2022-35796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35796"
},
{
"name": "CVE-2022-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2606"
},
{
"name": "CVE-2022-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2619"
},
{
"name": "CVE-2022-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2610"
},
{
"name": "CVE-2022-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2624"
},
{
"name": "CVE-2022-2622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2622"
},
{
"name": "CVE-2022-2616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2616"
},
{
"name": "CVE-2022-2614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2614"
},
{
"name": "CVE-2022-2618",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2618"
},
{
"name": "CVE-2022-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2623"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-713",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2619 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2619"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2621 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2621"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2605 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2605"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2611 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2611"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2623 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2623"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2610 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2610"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2618 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2618"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-35796 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35796"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2615 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2615"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2606 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2606"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2622 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2622"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33649 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33649"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2604 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2604"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2612 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2612"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2616 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2616"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2603 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2603"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2614 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2614"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2624 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2624"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2617 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2617"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-33636 du 05 ao\u00fbt 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33636"
}
]
}
BDU:2022-04886
Vulnerability from fstec - Published: 05.08.2022{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Google Inc, Microsoft Corp, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 1.7 (Astra Linux Special Edition), \u0434\u043e 104.0.5112.79 (Google Chrome), \u0434\u043e 104.0.1293.47 (Microsoft Edge), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.6 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432.\n\u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u044b \u0441 \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0432\u0435\u0431-\u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c;\n- \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0432 \u0441\u0435\u0442\u044c \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u2013 \u0440\u0435\u0433\u043b\u0430\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044f \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0439;\n- \u0437\u0430\u043f\u0443\u0441\u043a \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0441 \u043c\u0438\u043d\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432;\n- \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\u0414\u043b\u044f Google Chrome:\nhttps://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html\n\n\u0414\u043b\u044f Microsoft Edge:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2621\n\u0414\u043b\u044f Astra Linux Special Edition 1.7 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b x86-64:\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-1011SE17MD\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 107.0.5304.87+repack-1~deb11u1.osnova1\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-1121SE47\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20221220SE16\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.08.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "10.08.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-04886",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-2621",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Google Chrome, Microsoft Edge, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux - , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Microsoft Corp Windows - , Apple Inc. MacOS - , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.6 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2621\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-1011SE17MD\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.6/\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-1121SE47\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20221220SE16\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023\nhttps://crbug.com/1323449",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
FKIE_CVE-2022-2621
Vulnerability from fkie_nvd - Published: 2022-08-12 20:15 - Updated: 2024-11-21 07:01| URL | Tags | ||
|---|---|---|---|
| chrome-cve-admin@google.com | https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html | Release Notes | |
| chrome-cve-admin@google.com | https://crbug.com/1323449 | Exploit, Issue Tracking, Mailing List, Vendor Advisory | |
| chrome-cve-admin@google.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Mailing List, Third Party Advisory | |
| chrome-cve-admin@google.com | https://security.gentoo.org/glsa/202208-35 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html | Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | https://crbug.com/1323449 | Exploit, Issue Tracking, Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202208-35 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| fedoraproject | fedora | 37 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6D91985-7B58-466C-824B-6658D70D21D4",
"versionEndExcluding": "104.0.5112.79",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions."
},
{
"lang": "es",
"value": "Un uso de la memoria previamente liberada en Extensions en Google Chrome versiones anteriores a 104.0.5112.79, permit\u00eda a un atacante que convenciera a un usuario de instalar una extensi\u00f3n maliciosa explotar potencialmente la corrupci\u00f3n de la pila por medio de interacciones de Interfaz de Usuario espec\u00edficas."
}
],
"id": "CVE-2022-2621",
"lastModified": "2024-11-21T07:01:22.497",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-08-12T20:15:09.360",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Vendor Advisory"
],
"url": "https://crbug.com/1323449"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Vendor Advisory"
],
"url": "https://crbug.com/1323449"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-35"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-WFVR-4P83-R8MF
Vulnerability from github – Published: 2022-08-13 00:00 – Updated: 2022-08-16 00:00Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.
{
"affected": [],
"aliases": [
"CVE-2022-2621"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-08-12T20:15:00Z",
"severity": "HIGH"
},
"details": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.",
"id": "GHSA-wfvr-4p83-r8mf",
"modified": "2022-08-16T00:00:24Z",
"published": "2022-08-13T00:00:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2621"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
},
{
"type": "WEB",
"url": "https://crbug.com/1323449"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202208-35"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-2621
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-2621",
"description": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.",
"id": "GSD-2022-2621",
"references": [
"https://www.debian.org/security/2022/dsa-5201",
"https://advisories.mageia.org/CVE-2022-2621.html",
"https://www.suse.com/security/cve/CVE-2022-2621.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-2621"
],
"details": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.",
"id": "GSD-2022-2621",
"modified": "2023-12-13T01:19:19.939747Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2022-2621",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "104.0.5112.79"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1323449",
"refsource": "MISC",
"url": "https://crbug.com/1323449"
},
{
"name": "GLSA-202208-35",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"name": "FEDORA-2022-3f28aa88cf",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6D91985-7B58-466C-824B-6658D70D21D4",
"versionEndExcluding": "104.0.5112.79",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions."
},
{
"lang": "es",
"value": "Un uso de la memoria previamente liberada en Extensions en Google Chrome versiones anteriores a 104.0.5112.79, permit\u00eda a un atacante que convenciera a un usuario de instalar una extensi\u00f3n maliciosa explotar potencialmente la corrupci\u00f3n de la pila por medio de interacciones de Interfaz de Usuario espec\u00edficas."
}
],
"id": "CVE-2022-2621",
"lastModified": "2024-02-02T16:39:51.643",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-08-12T20:15:09.360",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Vendor Advisory"
],
"url": "https://crbug.com/1323449"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-35"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
OPENSUSE-SU-2022:10086-1
Vulnerability from csaf_opensuse - Published: 2022-08-12 15:02 - Updated: 2022-08-12 15:02| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1202075 | self |
| https://www.suse.com/security/cve/CVE-2022-2603/ | self |
| https://www.suse.com/security/cve/CVE-2022-2604/ | self |
| https://www.suse.com/security/cve/CVE-2022-2605/ | self |
| https://www.suse.com/security/cve/CVE-2022-2606/ | self |
| https://www.suse.com/security/cve/CVE-2022-2607/ | self |
| https://www.suse.com/security/cve/CVE-2022-2608/ | self |
| https://www.suse.com/security/cve/CVE-2022-2609/ | self |
| https://www.suse.com/security/cve/CVE-2022-2610/ | self |
| https://www.suse.com/security/cve/CVE-2022-2611/ | self |
| https://www.suse.com/security/cve/CVE-2022-2612/ | self |
| https://www.suse.com/security/cve/CVE-2022-2613/ | self |
| https://www.suse.com/security/cve/CVE-2022-2614/ | self |
| https://www.suse.com/security/cve/CVE-2022-2615/ | self |
| https://www.suse.com/security/cve/CVE-2022-2616/ | self |
| https://www.suse.com/security/cve/CVE-2022-2617/ | self |
| https://www.suse.com/security/cve/CVE-2022-2618/ | self |
| https://www.suse.com/security/cve/CVE-2022-2619/ | self |
| https://www.suse.com/security/cve/CVE-2022-2620/ | self |
| https://www.suse.com/security/cve/CVE-2022-2621/ | self |
| https://www.suse.com/security/cve/CVE-2022-2622/ | self |
| https://www.suse.com/security/cve/CVE-2022-2623/ | self |
| https://www.suse.com/security/cve/CVE-2022-2624/ | self |
| https://www.suse.com/security/cve/CVE-2022-2603 | external |
| https://www.suse.com/security/cve/CVE-2022-2604 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2605 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2606 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2607 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2608 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2609 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2610 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2611 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2612 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2613 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2614 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2615 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2616 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2617 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2618 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2619 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2620 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2621 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2622 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2623 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2624 | external |
| https://bugzilla.suse.com/1202075 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium 104.0.5112.79 (boo#1202075)\n\n* CVE-2022-2603: Use after free in Omnibox\n* CVE-2022-2604: Use after free in Safe Browsing\n* CVE-2022-2605: Out of bounds read in Dawn\n* CVE-2022-2606: Use after free in Managed devices API\n* CVE-2022-2607: Use after free in Tab Strip\n* CVE-2022-2608: Use after free in Overview Mode\n* CVE-2022-2609: Use after free in Nearby Share\n* CVE-2022-2610: Insufficient policy enforcement in Background Fetch\n* CVE-2022-2611: Inappropriate implementation in Fullscreen API\n* CVE-2022-2612: Side-channel information leakage in Keyboard input\n* CVE-2022-2613: Use after free in Input\n* CVE-2022-2614: Use after free in Sign-In Flow\n* CVE-2022-2615: Insufficient policy enforcement in Cookies\n* CVE-2022-2616: Inappropriate implementation in Extensions API\n* CVE-2022-2617: Use after free in Extensions API\n* CVE-2022-2618: Insufficient validation of untrusted input in Internals\n* CVE-2022-2619: Insufficient validation of untrusted input in Settings\n* CVE-2022-2620: Use after free in WebUI\n* CVE-2022-2621: Use after free in Extensions\n* CVE-2022-2622: Insufficient validation of untrusted input in Safe Browsing\n* CVE-2022-2623: Use after free in Offline\n* CVE-2022-2624: Heap buffer overflow in PDF\n\n- Switch back to Clang so that we can use BTI on aarch64\n * Gold is too old - doesn\u0027t understand BTI\n * LD crashes on aarch64\n- Re-enable LTO\n- Prepare move to FFmpeg 5 for new channel layout\n (requires 5.1+)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-10086",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_10086-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:10086-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43GPO54KYGHLDE7YCWHFLKD7CTXUXDWK/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:10086-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43GPO54KYGHLDE7YCWHFLKD7CTXUXDWK/"
},
{
"category": "self",
"summary": "SUSE Bug 1202075",
"url": "https://bugzilla.suse.com/1202075"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2603 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2604 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2605 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2606 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2607 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2608 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2609 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2610 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2611 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2612 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2613 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2614 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2614/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2616 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2617 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2618 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2619 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2622 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2623 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2624 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2624/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2022-08-12T15:02:47Z",
"generator": {
"date": "2022-08-12T15:02:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:10086-1",
"initial_release_date": "2022-08-12T15:02:47Z",
"revision_history": [
{
"date": "2022-08-12T15:02:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"product": {
"name": "chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"product_id": "chromedriver-104.0.5112.79-bp154.2.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"product": {
"name": "chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"product_id": "chromium-104.0.5112.79-bp154.2.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"product": {
"name": "chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"product_id": "chromedriver-104.0.5112.79-bp154.2.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"product": {
"name": "chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"product_id": "chromium-104.0.5112.79-bp154.2.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP4",
"product": {
"name": "SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64"
},
"product_reference": "chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64"
},
"product_reference": "chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-104.0.5112.79-bp154.2.20.1.aarch64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64"
},
"product_reference": "chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-104.0.5112.79-bp154.2.20.1.x86_64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
},
"product_reference": "chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-104.0.5112.79-bp154.2.20.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64"
},
"product_reference": "chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-104.0.5112.79-bp154.2.20.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64"
},
"product_reference": "chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-104.0.5112.79-bp154.2.20.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64"
},
"product_reference": "chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-104.0.5112.79-bp154.2.20.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
},
"product_reference": "chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2603"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Omnibox in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2603",
"url": "https://www.suse.com/security/cve/CVE-2022-2603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2603"
},
{
"cve": "CVE-2022-2604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2604"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Safe Browsing in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2604",
"url": "https://www.suse.com/security/cve/CVE-2022-2604"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2604",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2604"
},
{
"cve": "CVE-2022-2605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2605"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Dawn in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2605",
"url": "https://www.suse.com/security/cve/CVE-2022-2605"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2605",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2605"
},
{
"cve": "CVE-2022-2606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2606"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2606",
"url": "https://www.suse.com/security/cve/CVE-2022-2606"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2606",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2606"
},
{
"cve": "CVE-2022-2607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2607"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Tab Strip in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2607",
"url": "https://www.suse.com/security/cve/CVE-2022-2607"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2607",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2607"
},
{
"cve": "CVE-2022-2608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2608"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Overview Mode in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2608",
"url": "https://www.suse.com/security/cve/CVE-2022-2608"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2608",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2608"
},
{
"cve": "CVE-2022-2609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2609"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Nearby Share in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2609",
"url": "https://www.suse.com/security/cve/CVE-2022-2609"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2609",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2609"
},
{
"cve": "CVE-2022-2610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2610"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Background Fetch in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2610",
"url": "https://www.suse.com/security/cve/CVE-2022-2610"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2610",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2610"
},
{
"cve": "CVE-2022-2611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2611"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Fullscreen API in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2611",
"url": "https://www.suse.com/security/cve/CVE-2022-2611"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2611",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2611"
},
{
"cve": "CVE-2022-2612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2612"
}
],
"notes": [
{
"category": "general",
"text": "Side-channel information leakage in Keyboard input in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2612",
"url": "https://www.suse.com/security/cve/CVE-2022-2612"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2612",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2612"
},
{
"cve": "CVE-2022-2613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2613"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2613",
"url": "https://www.suse.com/security/cve/CVE-2022-2613"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2613",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2613"
},
{
"cve": "CVE-2022-2614",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2614"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2614",
"url": "https://www.suse.com/security/cve/CVE-2022-2614"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2614",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2614"
},
{
"cve": "CVE-2022-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2615"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2615",
"url": "https://www.suse.com/security/cve/CVE-2022-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2615",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2615"
},
{
"cve": "CVE-2022-2616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2616"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2616",
"url": "https://www.suse.com/security/cve/CVE-2022-2616"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2616",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2616"
},
{
"cve": "CVE-2022-2617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2617"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2617",
"url": "https://www.suse.com/security/cve/CVE-2022-2617"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2617",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2617"
},
{
"cve": "CVE-2022-2618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2618"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Internals in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a malicious file .",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2618",
"url": "https://www.suse.com/security/cve/CVE-2022-2618"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2618",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2618"
},
{
"cve": "CVE-2022-2619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2619"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Settings in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2619",
"url": "https://www.suse.com/security/cve/CVE-2022-2619"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2619",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2619"
},
{
"cve": "CVE-2022-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2620"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebUI in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2620",
"url": "https://www.suse.com/security/cve/CVE-2022-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2620",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2620"
},
{
"cve": "CVE-2022-2621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2621"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2621",
"url": "https://www.suse.com/security/cve/CVE-2022-2621"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2621",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2621"
},
{
"cve": "CVE-2022-2622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2622"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Safe Browsing in Google Chrome on Windows prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2622",
"url": "https://www.suse.com/security/cve/CVE-2022-2622"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2622",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2622"
},
{
"cve": "CVE-2022-2623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2623"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Offline in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2623",
"url": "https://www.suse.com/security/cve/CVE-2022-2623"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2623",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2623"
},
{
"cve": "CVE-2022-2624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2624"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in PDF in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2624",
"url": "https://www.suse.com/security/cve/CVE-2022-2624"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2624",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromedriver-104.0.5112.79-bp154.2.20.1.x86_64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.aarch64",
"openSUSE Leap 15.4:chromium-104.0.5112.79-bp154.2.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-12T15:02:47Z",
"details": "important"
}
],
"title": "CVE-2022-2624"
}
]
}
OPENSUSE-SU-2022:10092-1
Vulnerability from csaf_opensuse - Published: 2022-08-16 07:43 - Updated: 2022-08-16 07:43| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1202075 | self |
| https://www.suse.com/security/cve/CVE-2022-2603/ | self |
| https://www.suse.com/security/cve/CVE-2022-2604/ | self |
| https://www.suse.com/security/cve/CVE-2022-2605/ | self |
| https://www.suse.com/security/cve/CVE-2022-2606/ | self |
| https://www.suse.com/security/cve/CVE-2022-2607/ | self |
| https://www.suse.com/security/cve/CVE-2022-2608/ | self |
| https://www.suse.com/security/cve/CVE-2022-2609/ | self |
| https://www.suse.com/security/cve/CVE-2022-2610/ | self |
| https://www.suse.com/security/cve/CVE-2022-2611/ | self |
| https://www.suse.com/security/cve/CVE-2022-2612/ | self |
| https://www.suse.com/security/cve/CVE-2022-2613/ | self |
| https://www.suse.com/security/cve/CVE-2022-2614/ | self |
| https://www.suse.com/security/cve/CVE-2022-2615/ | self |
| https://www.suse.com/security/cve/CVE-2022-2616/ | self |
| https://www.suse.com/security/cve/CVE-2022-2617/ | self |
| https://www.suse.com/security/cve/CVE-2022-2618/ | self |
| https://www.suse.com/security/cve/CVE-2022-2619/ | self |
| https://www.suse.com/security/cve/CVE-2022-2620/ | self |
| https://www.suse.com/security/cve/CVE-2022-2621/ | self |
| https://www.suse.com/security/cve/CVE-2022-2622/ | self |
| https://www.suse.com/security/cve/CVE-2022-2623/ | self |
| https://www.suse.com/security/cve/CVE-2022-2624/ | self |
| https://www.suse.com/security/cve/CVE-2022-2603 | external |
| https://www.suse.com/security/cve/CVE-2022-2604 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2605 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2606 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2607 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2608 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2609 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2610 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2611 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2612 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2613 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2614 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2615 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2616 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2617 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2618 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2619 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2620 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2621 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2622 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2623 | external |
| https://bugzilla.suse.com/1202075 | external |
| https://www.suse.com/security/cve/CVE-2022-2624 | external |
| https://bugzilla.suse.com/1202075 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium 104.0.5112.79 (boo#1202075)\n\n* CVE-2022-2603: Use after free in Omnibox\n* CVE-2022-2604: Use after free in Safe Browsing\n* CVE-2022-2605: Out of bounds read in Dawn\n* CVE-2022-2606: Use after free in Managed devices API\n* CVE-2022-2607: Use after free in Tab Strip\n* CVE-2022-2608: Use after free in Overview Mode\n* CVE-2022-2609: Use after free in Nearby Share\n* CVE-2022-2610: Insufficient policy enforcement in Background Fetch\n* CVE-2022-2611: Inappropriate implementation in Fullscreen API\n* CVE-2022-2612: Side-channel information leakage in Keyboard input\n* CVE-2022-2613: Use after free in Input\n* CVE-2022-2614: Use after free in Sign-In Flow\n* CVE-2022-2615: Insufficient policy enforcement in Cookies\n* CVE-2022-2616: Inappropriate implementation in Extensions API\n* CVE-2022-2617: Use after free in Extensions API\n* CVE-2022-2618: Insufficient validation of untrusted input in Internals\n* CVE-2022-2619: Insufficient validation of untrusted input in Settings\n* CVE-2022-2620: Use after free in WebUI\n* CVE-2022-2621: Use after free in Extensions\n* CVE-2022-2622: Insufficient validation of untrusted input in Safe Browsing\n* CVE-2022-2623: Use after free in Offline\n* CVE-2022-2624: Heap buffer overflow in PDF\n\n- Switch back to Clang so that we can use BTI on aarch64\n * Gold is too old - doesn\u0027t understand BTI\n * LD crashes on aarch64\n- Re-enable LTO\n- Prepare move to FFmpeg 5 for new channel layout\n (requires 5.1+)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-10092",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_10092-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:10092-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6RNQ4ONDRAPKKAAKDX4PXEI5DY7JVBX/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:10092-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6RNQ4ONDRAPKKAAKDX4PXEI5DY7JVBX/"
},
{
"category": "self",
"summary": "SUSE Bug 1202075",
"url": "https://bugzilla.suse.com/1202075"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2603 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2604 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2605 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2606 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2607 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2608 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2609 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2610 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2611 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2612 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2613 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2614 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2614/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2616 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2617 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2618 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2619 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2622 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2623 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2624 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2624/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2022-08-16T07:43:41Z",
"generator": {
"date": "2022-08-16T07:43:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:10092-1",
"initial_release_date": "2022-08-16T07:43:41Z",
"revision_history": [
{
"date": "2022-08-16T07:43:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"product": {
"name": "chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"product_id": "chromedriver-104.0.5112.79-bp153.2.113.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"product": {
"name": "chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"product_id": "chromium-104.0.5112.79-bp153.2.113.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"product": {
"name": "chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"product_id": "chromedriver-104.0.5112.79-bp153.2.113.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"product": {
"name": "chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"product_id": "chromium-104.0.5112.79-bp153.2.113.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP3",
"product": {
"name": "SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64"
},
"product_reference": "chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64"
},
"product_reference": "chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-104.0.5112.79-bp153.2.113.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64"
},
"product_reference": "chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-104.0.5112.79-bp153.2.113.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
},
"product_reference": "chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-104.0.5112.79-bp153.2.113.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64"
},
"product_reference": "chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-104.0.5112.79-bp153.2.113.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64"
},
"product_reference": "chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-104.0.5112.79-bp153.2.113.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64"
},
"product_reference": "chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-104.0.5112.79-bp153.2.113.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
},
"product_reference": "chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2603"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Omnibox in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2603",
"url": "https://www.suse.com/security/cve/CVE-2022-2603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2603"
},
{
"cve": "CVE-2022-2604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2604"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Safe Browsing in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2604",
"url": "https://www.suse.com/security/cve/CVE-2022-2604"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2604",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2604"
},
{
"cve": "CVE-2022-2605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2605"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Dawn in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2605",
"url": "https://www.suse.com/security/cve/CVE-2022-2605"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2605",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2605"
},
{
"cve": "CVE-2022-2606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2606"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Managed devices API in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enable a specific Enterprise policy to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2606",
"url": "https://www.suse.com/security/cve/CVE-2022-2606"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2606",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2606"
},
{
"cve": "CVE-2022-2607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2607"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Tab Strip in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2607",
"url": "https://www.suse.com/security/cve/CVE-2022-2607"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2607",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2607"
},
{
"cve": "CVE-2022-2608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2608"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Overview Mode in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2608",
"url": "https://www.suse.com/security/cve/CVE-2022-2608"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2608",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2608"
},
{
"cve": "CVE-2022-2609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2609"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Nearby Share in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2609",
"url": "https://www.suse.com/security/cve/CVE-2022-2609"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2609",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2609"
},
{
"cve": "CVE-2022-2610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2610"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Background Fetch in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2610",
"url": "https://www.suse.com/security/cve/CVE-2022-2610"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2610",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2610"
},
{
"cve": "CVE-2022-2611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2611"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Fullscreen API in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2611",
"url": "https://www.suse.com/security/cve/CVE-2022-2611"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2611",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2611"
},
{
"cve": "CVE-2022-2612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2612"
}
],
"notes": [
{
"category": "general",
"text": "Side-channel information leakage in Keyboard input in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2612",
"url": "https://www.suse.com/security/cve/CVE-2022-2612"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2612",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2612"
},
{
"cve": "CVE-2022-2613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2613"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Input in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to enage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2613",
"url": "https://www.suse.com/security/cve/CVE-2022-2613"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2613",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2613"
},
{
"cve": "CVE-2022-2614",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2614"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Sign-In Flow in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2614",
"url": "https://www.suse.com/security/cve/CVE-2022-2614"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2614",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2614"
},
{
"cve": "CVE-2022-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2615"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2615",
"url": "https://www.suse.com/security/cve/CVE-2022-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2615",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2615"
},
{
"cve": "CVE-2022-2616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2616"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2616",
"url": "https://www.suse.com/security/cve/CVE-2022-2616"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2616",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2616"
},
{
"cve": "CVE-2022-2617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2617"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2617",
"url": "https://www.suse.com/security/cve/CVE-2022-2617"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2617",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2617"
},
{
"cve": "CVE-2022-2618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2618"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Internals in Google Chrome prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a malicious file .",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2618",
"url": "https://www.suse.com/security/cve/CVE-2022-2618"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2618",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2618"
},
{
"cve": "CVE-2022-2619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2619"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Settings in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2619",
"url": "https://www.suse.com/security/cve/CVE-2022-2619"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2619",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2619"
},
{
"cve": "CVE-2022-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2620"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebUI in Google Chrome on Chrome OS prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2620",
"url": "https://www.suse.com/security/cve/CVE-2022-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2620",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2620"
},
{
"cve": "CVE-2022-2621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2621"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Extensions in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2621",
"url": "https://www.suse.com/security/cve/CVE-2022-2621"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2621",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2621"
},
{
"cve": "CVE-2022-2622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2622"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Safe Browsing in Google Chrome on Windows prior to 104.0.5112.79 allowed a remote attacker to bypass download restrictions via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2622",
"url": "https://www.suse.com/security/cve/CVE-2022-2622"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2622",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2622"
},
{
"cve": "CVE-2022-2623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2623"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Offline in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2623",
"url": "https://www.suse.com/security/cve/CVE-2022-2623"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2623",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2623"
},
{
"cve": "CVE-2022-2624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2624"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in PDF in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2624",
"url": "https://www.suse.com/security/cve/CVE-2022-2624"
},
{
"category": "external",
"summary": "SUSE Bug 1202075 for CVE-2022-2624",
"url": "https://bugzilla.suse.com/1202075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromedriver-104.0.5112.79-bp153.2.113.1.x86_64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.aarch64",
"openSUSE Leap 15.3:chromium-104.0.5112.79-bp153.2.113.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-16T07:43:41Z",
"details": "important"
}
],
"title": "CVE-2022-2624"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.