opensuse-su-2022:10119-1
Vulnerability from csaf_opensuse
Published
2022-09-12 14:03
Modified
2022-09-12 14:03
Summary
Security update for chromium
Notes
Title of the patch
Security update for chromium
Description of the patch
This update for chromium fixes the following issues:
Chromium 105.0.5195.102 (boo#1203102):
* CVE-2022-3075: Insufficient data validation in Mojo
Chromium 105.0.5195.52 (boo#1202964):
* CVE-2022-3038: Use after free in Network Service
* CVE-2022-3039: Use after free in WebSQL
* CVE-2022-3040: Use after free in Layout
* CVE-2022-3041: Use after free in WebSQL
* CVE-2022-3042: Use after free in PhoneHub
* CVE-2022-3043: Heap buffer overflow in Screen Capture
* CVE-2022-3044: Inappropriate implementation in Site Isolation
* CVE-2022-3045: Insufficient validation of untrusted input in V8
* CVE-2022-3046: Use after free in Browser Tag
* CVE-2022-3071: Use after free in Tab Strip
* CVE-2022-3047: Insufficient policy enforcement in Extensions API
* CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen
* CVE-2022-3049: Use after free in SplitScreen
* CVE-2022-3050: Heap buffer overflow in WebUI
* CVE-2022-3051: Heap buffer overflow in Exosphere
* CVE-2022-3052: Heap buffer overflow in Window Manager
* CVE-2022-3053: Inappropriate implementation in Pointer Lock
* CVE-2022-3054: Insufficient policy enforcement in DevTools
* CVE-2022-3055: Use after free in Passwords
* CVE-2022-3056: Insufficient policy enforcement in Content Security Policy
* CVE-2022-3057: Inappropriate implementation in iframe Sandbox
* CVE-2022-3058: Use after free in Sign-In Flow
- Update chromium-symbolic.svg: this fixes boo#1202403.
- Fix quoting in chrome-wrapper, don't put cwd on LD_LIBRARY_PATH
Patchnames
openSUSE-2022-10119
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium 105.0.5195.102 (boo#1203102):\n\n* CVE-2022-3075: Insufficient data validation in Mojo\n\nChromium 105.0.5195.52 (boo#1202964):\n\n* CVE-2022-3038: Use after free in Network Service\n* CVE-2022-3039: Use after free in WebSQL\n* CVE-2022-3040: Use after free in Layout\n* CVE-2022-3041: Use after free in WebSQL\n* CVE-2022-3042: Use after free in PhoneHub\n* CVE-2022-3043: Heap buffer overflow in Screen Capture\n* CVE-2022-3044: Inappropriate implementation in Site Isolation\n* CVE-2022-3045: Insufficient validation of untrusted input in V8\n* CVE-2022-3046: Use after free in Browser Tag\n* CVE-2022-3071: Use after free in Tab Strip\n* CVE-2022-3047: Insufficient policy enforcement in Extensions API\n* CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen\n* CVE-2022-3049: Use after free in SplitScreen\n* CVE-2022-3050: Heap buffer overflow in WebUI\n* CVE-2022-3051: Heap buffer overflow in Exosphere\n* CVE-2022-3052: Heap buffer overflow in Window Manager\n* CVE-2022-3053: Inappropriate implementation in Pointer Lock\n* CVE-2022-3054: Insufficient policy enforcement in DevTools\n* CVE-2022-3055: Use after free in Passwords\n* CVE-2022-3056: Insufficient policy enforcement in Content Security Policy\n* CVE-2022-3057: Inappropriate implementation in iframe Sandbox\n* CVE-2022-3058: Use after free in Sign-In Flow\n\n- Update chromium-symbolic.svg: this fixes boo#1202403.\n\n- Fix quoting in chrome-wrapper, don\u0027t put cwd on LD_LIBRARY_PATH\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-10119",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_10119-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:10119-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAVZ7A2NRXHLI7C5TFF7GQHYKEGQIQRR/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:10119-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAVZ7A2NRXHLI7C5TFF7GQHYKEGQIQRR/"
},
{
"category": "self",
"summary": "SUSE Bug 1202403",
"url": "https://bugzilla.suse.com/1202403"
},
{
"category": "self",
"summary": "SUSE Bug 1202964",
"url": "https://bugzilla.suse.com/1202964"
},
{
"category": "self",
"summary": "SUSE Bug 1203102",
"url": "https://bugzilla.suse.com/1203102"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3038 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3039 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3040 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3041 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3041/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3042 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3043 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3044 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3044/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3045 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3045/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3046 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3046/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3047 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3048 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3049 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3050 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3050/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3051 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3052 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3053 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3054 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3055 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3056 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3057 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3058 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3071 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3075 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3075/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2022-09-12T14:03:27Z",
"generator": {
"date": "2022-09-12T14:03:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:10119-1",
"initial_release_date": "2022-09-12T14:03:27Z",
"revision_history": [
{
"date": "2022-09-12T14:03:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"product": {
"name": "chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"product_id": "chromedriver-105.0.5195.102-bp154.2.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"product": {
"name": "chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"product_id": "chromium-105.0.5195.102-bp154.2.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"product": {
"name": "chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"product_id": "chromedriver-105.0.5195.102-bp154.2.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"product": {
"name": "chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"product_id": "chromium-105.0.5195.102-bp154.2.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP4",
"product": {
"name": "SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-105.0.5195.102-bp154.2.26.1.aarch64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64"
},
"product_reference": "chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-105.0.5195.102-bp154.2.26.1.x86_64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64"
},
"product_reference": "chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-105.0.5195.102-bp154.2.26.1.aarch64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64"
},
"product_reference": "chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-105.0.5195.102-bp154.2.26.1.x86_64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
},
"product_reference": "chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-105.0.5195.102-bp154.2.26.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64"
},
"product_reference": "chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-105.0.5195.102-bp154.2.26.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64"
},
"product_reference": "chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-105.0.5195.102-bp154.2.26.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64"
},
"product_reference": "chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-105.0.5195.102-bp154.2.26.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
},
"product_reference": "chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3038"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Network Service in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3038",
"url": "https://www.suse.com/security/cve/CVE-2022-3038"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3038",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3038"
},
{
"cve": "CVE-2022-3039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3039"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebSQL in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3039",
"url": "https://www.suse.com/security/cve/CVE-2022-3039"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3039",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3039"
},
{
"cve": "CVE-2022-3040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3040"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Layout in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3040",
"url": "https://www.suse.com/security/cve/CVE-2022-3040"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3040",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3040"
},
{
"cve": "CVE-2022-3041",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3041"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebSQL in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3041",
"url": "https://www.suse.com/security/cve/CVE-2022-3041"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3041",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3041"
},
{
"cve": "CVE-2022-3042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3042"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PhoneHub in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3042",
"url": "https://www.suse.com/security/cve/CVE-2022-3042"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3042",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3042"
},
{
"cve": "CVE-2022-3043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3043"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Screen Capture in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3043",
"url": "https://www.suse.com/security/cve/CVE-2022-3043"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3043",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3043"
},
{
"cve": "CVE-2022-3044",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3044"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Site Isolation in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3044",
"url": "https://www.suse.com/security/cve/CVE-2022-3044"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3044",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3044"
},
{
"cve": "CVE-2022-3045",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3045"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in V8 in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3045",
"url": "https://www.suse.com/security/cve/CVE-2022-3045"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3045",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3045"
},
{
"cve": "CVE-2022-3046",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3046"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Browser Tag in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3046",
"url": "https://www.suse.com/security/cve/CVE-2022-3046"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3046",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3046"
},
{
"cve": "CVE-2022-3047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3047"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Extensions API in Google Chrome prior to 105.0.5195.52 allowed an attacker who convinced a user to install a malicious extension to bypass downloads policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3047",
"url": "https://www.suse.com/security/cve/CVE-2022-3047"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3047",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3047"
},
{
"cve": "CVE-2022-3048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3048"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Chrome OS lockscreen in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a local attacker to bypass lockscreen navigation restrictions via physical access to the device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3048",
"url": "https://www.suse.com/security/cve/CVE-2022-3048"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3048",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3048"
},
{
"cve": "CVE-2022-3049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3049"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in SplitScreen in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3049",
"url": "https://www.suse.com/security/cve/CVE-2022-3049"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3049",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3049"
},
{
"cve": "CVE-2022-3050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3050"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in WebUI in Google Chrome on Chrome OS prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3050",
"url": "https://www.suse.com/security/cve/CVE-2022-3050"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3050",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3050"
},
{
"cve": "CVE-2022-3051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3051"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Exosphere in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3051",
"url": "https://www.suse.com/security/cve/CVE-2022-3051"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3051",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3051"
},
{
"cve": "CVE-2022-3052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3052"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Window Manager in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3052",
"url": "https://www.suse.com/security/cve/CVE-2022-3052"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3052",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3052"
},
{
"cve": "CVE-2022-3053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3053"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Pointer Lock in Google Chrome on Mac prior to 105.0.5195.52 allowed a remote attacker to restrict user navigation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3053",
"url": "https://www.suse.com/security/cve/CVE-2022-3053"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3053",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3053"
},
{
"cve": "CVE-2022-3054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3054"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in DevTools in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3054",
"url": "https://www.suse.com/security/cve/CVE-2022-3054"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3054",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3054"
},
{
"cve": "CVE-2022-3055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3055"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Passwords in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3055",
"url": "https://www.suse.com/security/cve/CVE-2022-3055"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3055",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3055"
},
{
"cve": "CVE-2022-3056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3056"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3056",
"url": "https://www.suse.com/security/cve/CVE-2022-3056"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3056",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3056"
},
{
"cve": "CVE-2022-3057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3057"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in iframe Sandbox in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3057",
"url": "https://www.suse.com/security/cve/CVE-2022-3057"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3057",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3057"
},
{
"cve": "CVE-2022-3058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3058"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Sign-In Flow in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3058",
"url": "https://www.suse.com/security/cve/CVE-2022-3058"
},
{
"category": "external",
"summary": "SUSE Bug 1202964 for CVE-2022-3058",
"url": "https://bugzilla.suse.com/1202964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "important"
}
],
"title": "CVE-2022-3058"
},
{
"cve": "CVE-2022-3071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3071"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Tab Strip in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3071",
"url": "https://www.suse.com/security/cve/CVE-2022-3071"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "low"
}
],
"title": "CVE-2022-3071"
},
{
"cve": "CVE-2022-3075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3075"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3075",
"url": "https://www.suse.com/security/cve/CVE-2022-3075"
},
{
"category": "external",
"summary": "SUSE Bug 1203102 for CVE-2022-3075",
"url": "https://bugzilla.suse.com/1203102"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"SUSE Package Hub 15 SP4:chromium-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromedriver-105.0.5195.102-bp154.2.26.1.x86_64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.aarch64",
"openSUSE Leap 15.4:chromium-105.0.5195.102-bp154.2.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T14:03:27Z",
"details": "critical"
}
],
"title": "CVE-2022-3075"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…