Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-2481 (GCVE-0-2022-2481)
Vulnerability from cvelistv5 – Published: 2022-07-28 00:00 – Updated: 2024-08-03 00:39- Use after free
| URL | Tags |
|---|---|
| https://chromereleases.googleblog.com/2022/07/sta… | |
| https://crbug.com/1341603 | |
| https://security.gentoo.org/glsa/202208-35 | vendor-advisory |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisory |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisory |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T00:39:07.699Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://crbug.com/1341603"
},
{
"name": "GLSA-202208-35",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"name": "FEDORA-2023-ea7128b5ce",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/"
},
{
"name": "FEDORA-2023-6c8de2cd15",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "103.0.5060.134",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use after free",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-19T02:06:37.090Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html"
},
{
"url": "https://crbug.com/1341603"
},
{
"name": "GLSA-202208-35",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"name": "FEDORA-2023-ea7128b5ce",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/"
},
{
"name": "FEDORA-2023-6c8de2cd15",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2022-2481",
"datePublished": "2022-07-28T00:00:00.000Z",
"dateReserved": "2022-07-19T00:00:00.000Z",
"dateUpdated": "2024-08-03T00:39:07.699Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-2481",
"date": "2026-05-19",
"epss": "0.00593",
"percentile": "0.69468"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"103.0.5060.134\", \"matchCriteriaId\": \"4834B642-5F9E-4B49-946D-C8A5F72AD4EF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.\"}, {\"lang\": \"es\", \"value\": \"Un uso de memoria previamente liberada en Views en Google Chrome versiones anteriores a 103.0.5060.134, permit\\u00eda a un atacante remoto que convenc\\u00eda a un usuario de participar en interacciones de usuario espec\\u00edficas explotar potencialmente la corrupci\\u00f3n de la pila por medio de una interacci\\u00f3n de la Interfaz de Usuario\"}]",
"id": "CVE-2022-2481",
"lastModified": "2024-11-21T07:01:04.973",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2022-07-28T02:15:08.113",
"references": "[{\"url\": \"https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1341603\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-35\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1341603\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-35\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-2481\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2022-07-28T02:15:08.113\",\"lastModified\":\"2024-11-21T07:01:04.973\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.\"},{\"lang\":\"es\",\"value\":\"Un uso de memoria previamente liberada en Views en Google Chrome versiones anteriores a 103.0.5060.134, permit\u00eda a un atacante remoto que convenc\u00eda a un usuario de participar en interacciones de usuario espec\u00edficas explotar potencialmente la corrupci\u00f3n de la pila por medio de una interacci\u00f3n de la Interfaz de Usuario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"103.0.5060.134\",\"matchCriteriaId\":\"4834B642-5F9E-4B49-946D-C8A5F72AD4EF\"}]}]}],\"references\":[{\"url\":\"https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1341603\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://security.gentoo.org/glsa/202208-35\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1341603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-35\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2022-AVI-662
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Chrome pour Windows, Mac et Linux versions ant\u00e9rieures \u00e0 103.0.5060.134",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2478"
},
{
"name": "CVE-2022-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2481"
},
{
"name": "CVE-2022-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2163"
},
{
"name": "CVE-2022-2477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2477"
},
{
"name": "CVE-2022-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2480"
},
{
"name": "CVE-2022-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2479"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-662",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome du 19 juillet 2022",
"url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html"
}
]
}
CERTFR-2022-AVI-675
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 103.0.1264.71",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2478"
},
{
"name": "CVE-2022-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2481"
},
{
"name": "CVE-2022-2477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2477"
},
{
"name": "CVE-2022-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2480"
},
{
"name": "CVE-2022-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2479"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2481 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2481"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2479 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2479"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2477 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2477"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2480 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2480"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2478 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2478"
}
],
"reference": "CERTFR-2022-AVI-675",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Edge\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2022-AVI-662
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Chrome pour Windows, Mac et Linux versions ant\u00e9rieures \u00e0 103.0.5060.134",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2478"
},
{
"name": "CVE-2022-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2481"
},
{
"name": "CVE-2022-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2163"
},
{
"name": "CVE-2022-2477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2477"
},
{
"name": "CVE-2022-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2480"
},
{
"name": "CVE-2022-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2479"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-662",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome du 19 juillet 2022",
"url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html"
}
]
}
CERTFR-2022-AVI-675
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 103.0.1264.71",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2478"
},
{
"name": "CVE-2022-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2481"
},
{
"name": "CVE-2022-2477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2477"
},
{
"name": "CVE-2022-2480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2480"
},
{
"name": "CVE-2022-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2479"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2481 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2481"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2479 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2479"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2477 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2477"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2480 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2480"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-2478 du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-2478"
}
],
"reference": "CERTFR-2022-AVI-675",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Edge\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 24 juillet 2022",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
BDU:2022-05323
Vulnerability from fstec - Published: 27.07.2022{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Novell Inc., Google Inc, Microsoft Corp, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 10 (Debian GNU/Linux), 15.3 (OpenSUSE Leap), 11 (Debian GNU/Linux), 1.7 (Astra Linux Special Edition), 15.4 (OpenSUSE Leap), \u0434\u043e 103.0.5060.134 (Google Chrome), \u0434\u043e 103.0.1264.71 (Microsoft Edge), 15.3 NonFree (OpenSUSE Leap), 15.4 NonFree (OpenSUSE Leap), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.6 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432.\n\u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u044b \u0441 \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0432\u0435\u0431-\u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c;\n- \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0432 \u0441\u0435\u0442\u044c \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u2013 \u0440\u0435\u0433\u043b\u0430\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044f \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0439;\n- \u0437\u0430\u043f\u0443\u0441\u043a \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0441 \u043c\u0438\u043d\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432;\n- \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\u0414\u043b\u044f Google Chrome:\nhttps://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html\n\n\u0414\u043b\u044f Microsoft Edge:\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-2481\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2022-2481\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2022-2481.html\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\n\u0414\u043b\u044f Astra Linux Special Edition 1.7 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b x86-64:\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-1011SE17MD\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 107.0.5304.87+repack-1~deb11u1.osnova1\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-1121SE47\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.07.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "26.08.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-05323",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-2481",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Debian GNU/Linux, OpenSUSE Leap, Google Chrome, Microsoft Edge, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux - , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Microsoft Corp Windows - , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Apple Inc. MacOS - , Novell Inc. OpenSUSE Leap 15.3 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Novell Inc. OpenSUSE Leap 15.4 , Novell Inc. OpenSUSE Leap 15.3 NonFree , Novell Inc. OpenSUSE Leap 15.4 NonFree , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.6 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Views \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Views \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-2481\nhttps://security-tracker.debian.org/tracker/CVE-2022-2481\nhttps://www.cybersecurity-help.cz/vdb/SB2022072302\nhttps://www.suse.com/security/cve/CVE-2022-2481.html\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-1011SE17MD\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.6/\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-1121SE47\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
FKIE_CVE-2022-2481
Vulnerability from fkie_nvd - Published: 2022-07-28 02:15 - Updated: 2024-11-21 07:01{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4834B642-5F9E-4B49-946D-C8A5F72AD4EF",
"versionEndExcluding": "103.0.5060.134",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction."
},
{
"lang": "es",
"value": "Un uso de memoria previamente liberada en Views en Google Chrome versiones anteriores a 103.0.5060.134, permit\u00eda a un atacante remoto que convenc\u00eda a un usuario de participar en interacciones de usuario espec\u00edficas explotar potencialmente la corrupci\u00f3n de la pila por medio de una interacci\u00f3n de la Interfaz de Usuario"
}
],
"id": "CVE-2022-2481",
"lastModified": "2024-11-21T07:01:04.973",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-07-28T02:15:08.113",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1341603"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1341603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-35"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-J8F6-F8VV-9F5C
Vulnerability from github – Published: 2022-07-29 00:00 – Updated: 2022-08-05 00:00Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.
{
"affected": [],
"aliases": [
"CVE-2022-2481"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-07-28T02:15:00Z",
"severity": "HIGH"
},
"details": "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.",
"id": "GHSA-j8f6-f8vv-9f5c",
"modified": "2022-08-05T00:00:26Z",
"published": "2022-07-29T00:00:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2481"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html"
},
{
"type": "WEB",
"url": "https://crbug.com/1341603"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202208-35"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-2481
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-2481",
"description": "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.",
"id": "GSD-2022-2481",
"references": [
"https://www.debian.org/security/2022/dsa-5187",
"https://www.suse.com/security/cve/CVE-2022-2481.html",
"https://advisories.mageia.org/CVE-2022-2481.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-2481"
],
"details": "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.",
"id": "GSD-2022-2481",
"modified": "2023-12-13T01:19:20.290718Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2022-2481",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "103.0.5060.134"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html"
},
{
"name": "https://crbug.com/1341603",
"refsource": "MISC",
"url": "https://crbug.com/1341603"
},
{
"name": "GLSA-202208-35",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"name": "FEDORA-2023-ea7128b5ce",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/"
},
{
"name": "FEDORA-2023-6c8de2cd15",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "103.0.5060.134",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2022-2481"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html"
},
{
"name": "https://crbug.com/1341603",
"refsource": "MISC",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1341603"
},
{
"name": "GLSA-202208-35",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-35"
},
{
"name": "FEDORA-2023-ea7128b5ce",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/"
},
{
"name": "FEDORA-2023-6c8de2cd15",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-08-19T03:15Z",
"publishedDate": "2022-07-28T02:15Z"
}
}
}
OPENSUSE-SU-2022:10073-1
Vulnerability from csaf_opensuse - Published: 2022-08-01 06:43 - Updated: 2022-08-01 06:43| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium was updated to 103.0.5060.134 (boo#1201679):\n\n* CVE-2022-2477 : Use after free in Guest View\n* CVE-2022-2478 : Use after free in PDF\n* CVE-2022-2479 : Insufficient validation of untrusted input in File\n* CVE-2022-2480 : Use after free in Service Worker API\n* CVE-2022-2481: Use after free in Views\n* CVE-2022-2163: Use after free in Cast UI and Toolbar\n* Various fixes from internal audits, fuzzing and other initiatives\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-10073",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_10073-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:10073-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32RZRSVM5BTCD25ZWPF7FIV6VKPYNU5E/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:10073-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32RZRSVM5BTCD25ZWPF7FIV6VKPYNU5E/"
},
{
"category": "self",
"summary": "SUSE Bug 1201679",
"url": "https://bugzilla.suse.com/1201679"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2163 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2477 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2478 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2479 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2480 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2481 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2481/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2022-08-01T06:43:27Z",
"generator": {
"date": "2022-08-01T06:43:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:10073-1",
"initial_release_date": "2022-08-01T06:43:27Z",
"revision_history": [
{
"date": "2022-08-01T06:43:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"product": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"product_id": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"product": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"product_id": "chromium-103.0.5060.134-bp154.2.17.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"product": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"product_id": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"product": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"product_id": "chromium-103.0.5060.134-bp154.2.17.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP3",
"product": {
"name": "SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3"
}
},
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP4",
"product": {
"name": "SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64"
},
"product_reference": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64"
},
"product_reference": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64"
},
"product_reference": "chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
},
"product_reference": "chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64"
},
"product_reference": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64"
},
"product_reference": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.aarch64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64"
},
"product_reference": "chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.x86_64 as component of SUSE Package Hub 15 SP4",
"product_id": "SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
},
"product_reference": "chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64"
},
"product_reference": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64"
},
"product_reference": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64"
},
"product_reference": "chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
},
"product_reference": "chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64"
},
"product_reference": "chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64"
},
"product_reference": "chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64"
},
"product_reference": "chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-103.0.5060.134-bp154.2.17.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
},
"product_reference": "chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2163"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Cast UI and Toolbar in Google Chrome prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via UI interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2163",
"url": "https://www.suse.com/security/cve/CVE-2022-2163"
},
{
"category": "external",
"summary": "SUSE Bug 1200783 for CVE-2022-2163",
"url": "https://bugzilla.suse.com/1200783"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2163",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T06:43:27Z",
"details": "important"
}
],
"title": "CVE-2022-2163"
},
{
"cve": "CVE-2022-2477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2477"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Guest View in Google Chrome prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2477",
"url": "https://www.suse.com/security/cve/CVE-2022-2477"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2477",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T06:43:27Z",
"details": "important"
}
],
"title": "CVE-2022-2477"
},
{
"cve": "CVE-2022-2478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2478"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PDF in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2478",
"url": "https://www.suse.com/security/cve/CVE-2022-2478"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2478",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T06:43:27Z",
"details": "important"
}
],
"title": "CVE-2022-2478"
},
{
"cve": "CVE-2022-2479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2479"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in File in Google Chrome on Android prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious app to obtain potentially sensitive information from internal file directories via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2479",
"url": "https://www.suse.com/security/cve/CVE-2022-2479"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2479",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T06:43:27Z",
"details": "important"
}
],
"title": "CVE-2022-2479"
},
{
"cve": "CVE-2022-2480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2480"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Service Worker API in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2480",
"url": "https://www.suse.com/security/cve/CVE-2022-2480"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2480",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T06:43:27Z",
"details": "important"
}
],
"title": "CVE-2022-2480"
},
{
"cve": "CVE-2022-2481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2481"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2481",
"url": "https://www.suse.com/security/cve/CVE-2022-2481"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2481",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"SUSE Package Hub 15 SP4:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.3:chromium-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromedriver-103.0.5060.134-bp154.2.17.2.x86_64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.aarch64",
"openSUSE Leap 15.4:chromium-103.0.5060.134-bp154.2.17.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T06:43:27Z",
"details": "important"
}
],
"title": "CVE-2022-2481"
}
]
}
OPENSUSE-SU-2022:10087-1
Vulnerability from csaf_opensuse - Published: 2022-08-15 22:01 - Updated: 2022-08-15 22:01| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for opera",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for opera fixes the following issues:\n\nopera was updated to 89.0.4447.71\n\n - CHR-8957 Update chromium on desktop-stable-103-4447 to\n 103.0.5060.134\n - DNA-100492 authPrivate.storeCredentials should work with\n running auth session\n - DNA-100649 \u201cSign out\u201d from settings doesn\u2019t also sign out\n from auth\n - DNA-100653 VPN Badge popup \u2013 not working well with different\n page zoom being set in browser settings\n - DNA-100712 Wrong spacing on text to reset sync passphrase\n in settings\n - DNA-100799 VPN icon is \u201cpro\u201d on disconnected\n - DNA-100841 Remove Get Subscription and Get button from\n VPN pro settings\n - DNA-100883 Update missing translations from chromium\n - DNA-100899 Translation error in Turkish\n - DNA-100912 Unable to select pinboards when sync everything\n is enabled\n - DNA-100959 Use after move RecentSearchProvider::ExecuteWithDB\n - DNA-100960 Use after move\n CountryBlacklistServiceImpl::DownloadCountryBlacklist\n - DNA-100961 Use after move\n CategorizationDataCollection::Iterator::Iterator\n - DNA-100989 Crash at\n opera::EasyFileButton::SetThumbnail(gfx::ImageSkia const\u0026)\n\n- The update to chromium 103.0.5060.134 fixes following issues:\n CVE-2022-2163, CVE-2022-2477, CVE-2022-2478, CVE-2022-2479\n CVE-2022-2480, CVE-2022-2481\n\nopera was updated to 89.0.4447.51\n\n - DNA-99538 Typed content of address bar shared between tabs\n - DNA-100418 Set 360 so as search engine in China\n - DNA-100629 Launch Auth login when enabling sync while logged in\n - DNA-100776 Popup is too long if there are no services available\n\nopera was updated to 89.0.4447.48\n\n - CHR-8940 Update chromium on desktop-stable-103-4447 to\n 103.0.5060.114\n - DNA-100247 Make it possible to display hint when tab scrolling\n gets triggered\n - DNA-100482 Shopping corner icon availability\n - DNA-100575 Add unique IDs to all web element in opera account\n popup\n - DNA-100625 Opera account popup appears too high on Linux\n - DNA-100627 Enable #snap-from-panel on all stream\n - DNA-100636 DCHECK at suggestion_item.cc(484)\n - DNA-100685 Fix crash when attaching to tab strip scroll buttons\n - DNA-100693 Enable Sticky Site sidebar item to have notification\n bubble\n - DNA-100698 [AdBlock] Unhandled Disconnect list category:\n \u0027emailaggressive\u0027\n - DNA-100716 Misstype Settings \u0027Enhanced address bar\u0027\n - DNA-100732 Fix \u0026amp; escaping in translated strings\n - DNA-100759 Crash when loading personal news in private window\n\n- The update to chromium 103.0.5060.114 fixes following issues:\n CVE-2022-2294, CVE-2022-2295, CVE-2022-2296\n\nopera was updated to 89.0.4447.38\n\n - DNA-100283 Translations for O89\n\n- Complete Opera 89.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-89/\n\nopera was updated to 89.0.4447.37\n\n - CHR-8929 Update chromium on desktop-stable-103-4447 to\n 103.0.5060.66\n - DNA-99780 Crash at zmq::zmq_abort(char const*)\n - DNA-100377 New opera account popup doesn\u2019t open on Linux\n - DNA-100589 Crash at base::internal::Invoker\u003cT\u003e::RunOnce\n (base::internal::BindStateBase*, scoped_refptr\u003cT\u003e\u0026\u0026)\n - DNA-100607 Sync \u201cSign in\u201d button doesn\u2019t work with Opera Account\n popup\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-10087",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_10087-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:10087-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SBC3VMU74SRNP6PNL6PMNTJCIFN32DXR/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:10087-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SBC3VMU74SRNP6PNL6PMNTJCIFN32DXR/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2163 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2294 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2295 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2296 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2477 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2478 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2478/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2479 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2480 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2481 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2481/"
}
],
"title": "Security update for opera",
"tracking": {
"current_release_date": "2022-08-15T22:01:27Z",
"generator": {
"date": "2022-08-15T22:01:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:10087-1",
"initial_release_date": "2022-08-15T22:01:27Z",
"revision_history": [
{
"date": "2022-08-15T22:01:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "opera-89.0.4447.71-lp153.2.54.1.x86_64",
"product": {
"name": "opera-89.0.4447.71-lp153.2.54.1.x86_64",
"product_id": "opera-89.0.4447.71-lp153.2.54.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3 NonFree",
"product": {
"name": "openSUSE Leap 15.3 NonFree",
"product_id": "openSUSE Leap 15.3 NonFree",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "opera-89.0.4447.71-lp153.2.54.1.x86_64 as component of openSUSE Leap 15.3 NonFree",
"product_id": "openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
},
"product_reference": "opera-89.0.4447.71-lp153.2.54.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3 NonFree"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2163"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Cast UI and Toolbar in Google Chrome prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via UI interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2163",
"url": "https://www.suse.com/security/cve/CVE-2022-2163"
},
{
"category": "external",
"summary": "SUSE Bug 1200783 for CVE-2022-2163",
"url": "https://bugzilla.suse.com/1200783"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2163",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-15T22:01:27Z",
"details": "important"
}
],
"title": "CVE-2022-2163"
},
{
"cve": "CVE-2022-2294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2294"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2294",
"url": "https://www.suse.com/security/cve/CVE-2022-2294"
},
{
"category": "external",
"summary": "SUSE Bug 1201216 for CVE-2022-2294",
"url": "https://bugzilla.suse.com/1201216"
},
{
"category": "external",
"summary": "SUSE Bug 1201980 for CVE-2022-2294",
"url": "https://bugzilla.suse.com/1201980"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-15T22:01:27Z",
"details": "important"
}
],
"title": "CVE-2022-2294"
},
{
"cve": "CVE-2022-2295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2295"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2295",
"url": "https://www.suse.com/security/cve/CVE-2022-2295"
},
{
"category": "external",
"summary": "SUSE Bug 1201216 for CVE-2022-2295",
"url": "https://bugzilla.suse.com/1201216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-15T22:01:27Z",
"details": "important"
}
],
"title": "CVE-2022-2295"
},
{
"cve": "CVE-2022-2296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2296"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Chrome OS Shell in Google Chrome on Chrome OS prior to 103.0.5060.114 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via direct UI interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2296",
"url": "https://www.suse.com/security/cve/CVE-2022-2296"
},
{
"category": "external",
"summary": "SUSE Bug 1201216 for CVE-2022-2296",
"url": "https://bugzilla.suse.com/1201216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-15T22:01:27Z",
"details": "important"
}
],
"title": "CVE-2022-2296"
},
{
"cve": "CVE-2022-2477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2477"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Guest View in Google Chrome prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2477",
"url": "https://www.suse.com/security/cve/CVE-2022-2477"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2477",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-15T22:01:27Z",
"details": "important"
}
],
"title": "CVE-2022-2477"
},
{
"cve": "CVE-2022-2478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2478"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PDF in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2478",
"url": "https://www.suse.com/security/cve/CVE-2022-2478"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2478",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-15T22:01:27Z",
"details": "important"
}
],
"title": "CVE-2022-2478"
},
{
"cve": "CVE-2022-2479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2479"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in File in Google Chrome on Android prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious app to obtain potentially sensitive information from internal file directories via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2479",
"url": "https://www.suse.com/security/cve/CVE-2022-2479"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2479",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-15T22:01:27Z",
"details": "important"
}
],
"title": "CVE-2022-2479"
},
{
"cve": "CVE-2022-2480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2480"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Service Worker API in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2480",
"url": "https://www.suse.com/security/cve/CVE-2022-2480"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2480",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-15T22:01:27Z",
"details": "important"
}
],
"title": "CVE-2022-2480"
},
{
"cve": "CVE-2022-2481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2481"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Views in Google Chrome prior to 103.0.5060.134 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via UI interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2481",
"url": "https://www.suse.com/security/cve/CVE-2022-2481"
},
{
"category": "external",
"summary": "SUSE Bug 1201679 for CVE-2022-2481",
"url": "https://bugzilla.suse.com/1201679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3 NonFree:opera-89.0.4447.71-lp153.2.54.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-15T22:01:27Z",
"details": "important"
}
],
"title": "CVE-2022-2481"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.