SB20230821153 - Fedora 38 update for chromium



SB20230821153 - Fedora 38 update for chromium

Published: August 21, 2023

Security Bulletin ID SB20230821153
Severity
High
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 30% Low 20%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Improperly implemented security check for standard (CVE-ID: CVE-2022-4906)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a incorrect implementation of certain features in Blink in Google Chrome. A remote attacker can trick the victim to visit a specially crafted webpage and execute arbitrary code on the system.


2) Use of uninitialized resource (CVE-ID: CVE-2022-4907)

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to usage of uninitialized resources in FFmpeg. A remote attacker can trick the victim to visit a malicious website and bypass implemented security mechanisms.


3) Improperly implemented security check for standard (CVE-ID: CVE-2022-4908)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to incorrect implementation in iFrame Sandbox in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.


4) Improperly implemented security check for standard (CVE-ID: CVE-2022-4909)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to incorrect implementation in XML in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.


5) Improperly implemented security check for standard (CVE-ID: CVE-2022-4910)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to incorrect implementation in Autofill in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.


6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-2311)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient policy enforcement in File System API in Google Chrome. A remote attacker can trick the victim to visit a specially crafted website, bypass implemented security measures and gain access to sensitive information.


7) Improperly implemented security check for standard (CVE-ID: CVE-2023-2313)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to incorrect implementation in Sandbox in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and compromise the system.


8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-2314)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient policy enforcement in Resource Timing in Google Chrome. A remote attacker can trick the victim to visit a specially crafted website, bypass implemented security measures and gain access to sensitive information.


9) Out-of-bounds write (CVE-ID: CVE-2023-2929)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted HTML content in Swiftshader. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.


10) Out-of-bounds write (CVE-ID: CVE-2023-3598)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in ANGLE component. A remote attacker can trick the victim to visit a specially crafted website, trigger an out-of-bounds write and execute arbitrary code on the target system.


Remediation

Install update from vendor's website.