Advisories » MGASA-2023-0289

Updated chromium-browser-stable packages fix bugs and vulnerabilities

Publication date: 19 Oct 2023
Modification date: 20 Oct 2023
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-5218 , CVE-2023-5487 , CVE-2023-5484 , CVE-2023-5475 , CVE-2023-5483 , CVE-2023-5481 , CVE-2023-5476 , CVE-2023-5474 , CVE-2023-5479 , CVE-2023-5485 , CVE-2023-5478 , CVE-2023-5477 , CVE-2023-5486 , CVE-2023-5473

Description

The chromium-browser-stable package has been updated to the
118.0.5993.70 release, fixing 20 bugs and vulnerabilities.

Some of the security fixes are:

Critical CVE-2023-5218: Use after free in Site Isolation. Reported by
@18 on 2023-09-27

Medium CVE-2023-5487: Inappropriate implementation in Fullscreen.
Reported by Anonymous on 2020-03-17

Medium CVE-2023-5484: Inappropriate implementation in Navigation.
Reported by Thomas Orlita on 2023-02-11

Medium CVE-2023-5475: Inappropriate implementation in DevTools. Reported
by Axel Chong on 2023-08-30

Medium CVE-2023-5483: Inappropriate implementation in Intents. Reported
by Axel Chong on 2023-03-17

Medium CVE-2023-5481: Inappropriate implementation in Downloads.
Reported by Om Apip on 2023-06-28

Medium CVE-2023-5476: Use after free in Blink History. Reported by
Yunqin Sun on 2023-08-20

Medium CVE-2023-5474: Heap buffer overflow in PDF. Reported by [pwn2car]
on 2023-09-15

Medium CVE-2023-5479: Inappropriate implementation in Extensions API.
Reported by Axel Chong on 2023-08-09

Low CVE-2023-5485: Inappropriate implementation in Autofill. Reported by
Ahmed ElMasry on 2022-12-02

Low CVE-2023-5478: Inappropriate implementation in Autofill. Reported by
Ahmed ElMasry on 2023-08-12

Low CVE-2023-5477: Inappropriate implementation in Installer. Reported
by Bahaa Naamneh of Crosspoint Labs on 2023-08-13

Low CVE-2023-5486: Inappropriate implementation in Input. Reported by
Hafiizh on 2022-08-29

Low CVE-2023-5473: Use after free in Cast. Reported by DarkNavy on
2023-09-18

Note: Access to bug details and links may be kept restricted until a
majority of users are updated with a fix. We will also retain
restrictions if the bug exists in a third party library that other
projects similarly depend on, but haven’t yet fixed.
                

References

SRPMS

9/tainted