SB20230821151 - Fedora 37 update for chromium
Published: August 21, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Improperly implemented security check for standard (CVE-ID: CVE-2022-4906)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a incorrect implementation of certain features in Blink in Google Chrome. A remote attacker can trick the victim to visit a specially crafted webpage and execute arbitrary code on the system.
2) Use of uninitialized resource (CVE-ID: CVE-2022-4907)
The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to usage of uninitialized resources in FFmpeg. A remote attacker can trick the victim to visit a malicious website and bypass implemented security mechanisms.
3) Improperly implemented security check for standard (CVE-ID: CVE-2022-4908)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrect implementation in iFrame Sandbox in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.
4) Improperly implemented security check for standard (CVE-ID: CVE-2022-4909)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrect implementation in XML in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.
5) Improperly implemented security check for standard (CVE-ID: CVE-2022-4910)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrect implementation in Autofill in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.
6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-2311)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient policy enforcement in File System API in Google Chrome. A remote attacker can trick the victim to visit a specially crafted website, bypass implemented security measures and gain access to sensitive information.
7) Improperly implemented security check for standard (CVE-ID: CVE-2023-2313)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to incorrect implementation in Sandbox in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and compromise the system.
8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-2314)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient policy enforcement in Resource Timing in Google Chrome. A remote attacker can trick the victim to visit a specially crafted website, bypass implemented security measures and gain access to sensitive information.
9) Out-of-bounds write (CVE-ID: CVE-2023-2929)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted HTML content in Swiftshader. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.
10) Out-of-bounds write (CVE-ID: CVE-2023-3598)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error in ANGLE component. A remote attacker can trick the victim to visit a specially crafted website, trigger an out-of-bounds write and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.