GLSA 202309-17: Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities
Severity: | high |
Title: | Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities |
Date: | 09/30/2023 |
Bugs: |
|
ID: | 202309-17 |
Synopsis
Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.Background
Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Google Chrome is one fast, simple, and secure browser for all your devices. Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
www-client/microsoft-edge | < 113.0.1774.50 | >= 113.0.1774.50 | All supported architectures |
www-client/google-chrome | < 113.0.5672.126 | >= 113.0.5672.126 | All supported architectures |
www-client/chromium-bin | < 113.0.5672.126 | All supported architectures | |
www-client/chromium | < 113.0.5672.126 | >= 113.0.5672.126 | All supported architectures |
Description
Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Chromium users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/chromium-113.0.5672.126"
All Google Chrome users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/google-chrome-113.0.5672.126"
All Microsoft Edge users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-113.0.1774.50"
Gentoo has discontinued support for www-client/chromium-bin. Users should unmerge it in favor of the above alternatives:
# emerge --ask --depclean --verbose "www-client/chromium-bin"
References
CVE-2023-29354 CVE-2023-29350 CVE-2023-29334 CVE-2023-28286 CVE-2023-28261 CVE-2023-23374 CVE-2023-21794 CVE-2023-21720 CVE-2023-2726 CVE-2023-2725 CVE-2023-2724 CVE-2023-2723 CVE-2023-2722 CVE-2023-2721 CVE-2023-2468 CVE-2023-2467 CVE-2023-2466 CVE-2023-2465 CVE-2023-2464 CVE-2023-2463 CVE-2023-2462 CVE-2023-2461 CVE-2023-2460 CVE-2023-2459 CVE-2023-2137 CVE-2023-2136 CVE-2023-2135 CVE-2023-2134 CVE-2023-2133 CVE-2023-2033 CVE-2023-1823 CVE-2023-1822 CVE-2023-1821 CVE-2023-1820 CVE-2023-1819 CVE-2023-1818 CVE-2023-1817 CVE-2023-1816 CVE-2023-1815 CVE-2023-1814 CVE-2023-1813 CVE-2023-1812 CVE-2023-1811 CVE-2023-1810 CVE-2023-1534 CVE-2023-1533 CVE-2023-1532 CVE-2023-1531 CVE-2023-1530 CVE-2023-1529 CVE-2023-1528 CVE-2023-0941 CVE-2023-0933 CVE-2023-0932 CVE-2023-0931 CVE-2023-0930 CVE-2023-0929 CVE-2023-0928 CVE-2023-0927 CVE-2023-0705 CVE-2023-0704 CVE-2023-0703 CVE-2023-0702 CVE-2023-0701 CVE-2023-0700 CVE-2023-0699 CVE-2023-0698 CVE-2023-0697 CVE-2023-0696
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.