{"affected":[{"ecosystem_specific":{"binaries":[{"chromedriver":"118.0.5993.70-bp155.2.46.1","chromium":"118.0.5993.70-bp155.2.46.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP4","name":"chromium","purl":"pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"118.0.5993.70-bp155.2.46.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"chromedriver":"118.0.5993.70-bp155.2.46.1","chromium":"118.0.5993.70-bp155.2.46.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP5","name":"chromium","purl":"pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"118.0.5993.70-bp155.2.46.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"chromedriver":"118.0.5993.70-bp155.2.46.1","chromium":"118.0.5993.70-bp155.2.46.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.4","name":"chromium","purl":"pkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"118.0.5993.70-bp155.2.46.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"chromedriver":"118.0.5993.70-bp155.2.46.1","chromium":"118.0.5993.70-bp155.2.46.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"chromium","purl":"pkg:rpm/opensuse/chromium&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"118.0.5993.70-bp155.2.46.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for chromium fixes the following issues:\n\nChromium 118.0.5993.70 (boo#1216111)\n\n- CVE-2023-5218: Use after free in Site Isolation\n- CVE-2023-5487: Inappropriate implementation in Fullscreen\n- CVE-2023-5484: Inappropriate implementation in Navigation\n- CVE-2023-5475: Inappropriate implementation in DevTools\n- CVE-2023-5483: Inappropriate implementation in Intents\n- CVE-2023-5481: Inappropriate implementation in Downloads\n- CVE-2023-5476: Use after free in Blink History\n- CVE-2023-5474: Heap buffer overflow in PDF\n- CVE-2023-5479: Inappropriate implementation in Extensions API\n- CVE-2023-5485: Inappropriate implementation in Autofill\n- CVE-2023-5478: Inappropriate implementation in Autofill\n- CVE-2023-5477: Inappropriate implementation in Installer\n- CVE-2023-5486: Inappropriate implementation in Input\n- CVE-2023-5473: Use after free in Cast\n","id":"openSUSE-SU-2023:0300-1","modified":"2023-10-13T08:14:00Z","published":"2023-10-13T08:14:00Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6FXBWPURXQ5GA2B7HRPHLBGPNS46F3Y/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5473"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5474"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5475"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5477"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5478"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5479"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5481"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5483"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5485"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5486"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5487"}],"related":["CVE-2023-5218","CVE-2023-5473","CVE-2023-5474","CVE-2023-5475","CVE-2023-5476","CVE-2023-5477","CVE-2023-5478","CVE-2023-5479","CVE-2023-5481","CVE-2023-5483","CVE-2023-5484","CVE-2023-5485","CVE-2023-5486","CVE-2023-5487"],"summary":"Security update for chromium","upstream":["CVE-2023-5218","CVE-2023-5473","CVE-2023-5474","CVE-2023-5475","CVE-2023-5476","CVE-2023-5477","CVE-2023-5478","CVE-2023-5479","CVE-2023-5481","CVE-2023-5483","CVE-2023-5484","CVE-2023-5485","CVE-2023-5486","CVE-2023-5487"]}