[GLSA-202208-25] Chromium, Google Chrome, Microsoft Edge, QtWebEngine: Multiple Vulnerabilities
Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
Background
Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web.
Google Chrome is one fast, simple, and secure browser for all your devices.
Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.
Description
Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Chromium users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/chromium-103.0.5060.53"
All Chromium binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/chromium-bin-103.0.5060.53"
All Google Chrome users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/google-chrome-103.0.5060.53"
All Microsoft Edge users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/chromium-103.0.5060.53"
All QtWebEngine users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-qt/qtwebengine-5.15.5_p20220618"
Package | Affected Version |
---|---|
pkg:ebuild/www-client/microsoft-edge?distro=gentoo | < 101.0.1210.47 |
pkg:ebuild/www-client/google-chrome?distro=gentoo | < 103.0.5060.53 |
pkg:ebuild/www-client/chromium?distro=gentoo | < 103.0.5060.53 |
pkg:ebuild/dev-qt/qtwebengine?distro=gentoo | < 5.15.5_p20220618 |
Package | Unaffected Version |
---|---|
pkg:ebuild/www-client/microsoft-edge?distro=gentoo | >= 101.0.1210.47 |
pkg:ebuild/www-client/google-chrome?distro=gentoo | >= 103.0.5060.53 |
pkg:ebuild/www-client/chromium?distro=gentoo | >= 103.0.5060.53 |
pkg:ebuild/dev-qt/qtwebengine?distro=gentoo | >= 5.15.5_p20220618 |
- ID
- GLSA-202208-25
- Severity
- high
- URL
- https://security.gentoo.org/glsa/202208-25
- Published
-
2022-08-14T00:00:00
(2 years ago) - Modified
-
2022-08-14T00:00:00
(2 years ago) - Rights
- Gentoo Foundation, Inc.
- Other Advisories
-
- ALPINE:CVE-2021-30551
- ALPINE:CVE-2021-4057
- ALPINE:CVE-2021-4058
- ALPINE:CVE-2021-4059
- ALPINE:CVE-2021-4062
- ALPINE:CVE-2021-4078
- ALPINE:CVE-2021-4079
- ALPINE:CVE-2022-0796
- ALPINE:CVE-2022-0797
- ALPINE:CVE-2022-0971
- ALPINE:CVE-2022-0978
- ALPINE:CVE-2022-1096
- ALPINE:CVE-2022-1125
- ALPINE:CVE-2022-1138
- ALPINE:CVE-2022-1305
- ALPINE:CVE-2022-1310
- ALPINE:CVE-2022-1314
- ALPINE:CVE-2022-1364
- ALPINE:CVE-2022-1477
- ALPINE:CVE-2022-1478
- ALPINE:CVE-2022-1479
- ALPINE:CVE-2022-1481
- ALPINE:CVE-2022-1482
- ALPINE:CVE-2022-1483
- ALPINE:CVE-2022-1484
- ALPINE:CVE-2022-1485
- ALPINE:CVE-2022-1486
- ALPINE:CVE-2022-1487
- ALPINE:CVE-2022-1488
- ALPINE:CVE-2022-1489
- ALPINE:CVE-2022-1490
- ALPINE:CVE-2022-1491
- ALPINE:CVE-2022-1492
- ALPINE:CVE-2022-1493
- ALPINE:CVE-2022-1494
- ALPINE:CVE-2022-1495
- ALPINE:CVE-2022-1496
- ALPINE:CVE-2022-1497
- ALPINE:CVE-2022-1498
- ALPINE:CVE-2022-1499
- ALPINE:CVE-2022-1500
- ALPINE:CVE-2022-1501
- ALPINE:CVE-2022-1633
- ALPINE:CVE-2022-1634
- ALPINE:CVE-2022-1635
- ALPINE:CVE-2022-1636
- ALPINE:CVE-2022-1637
- ALPINE:CVE-2022-1639
- ALPINE:CVE-2022-1640
- ALPINE:CVE-2022-1641
- ALPINE:CVE-2022-1853
- ALPINE:CVE-2022-1854
- ALPINE:CVE-2022-1855
- ALPINE:CVE-2022-1856
- ALPINE:CVE-2022-1857
- ALPINE:CVE-2022-1858
- ALPINE:CVE-2022-1859
- ALPINE:CVE-2022-1860
- ALPINE:CVE-2022-1861
- ALPINE:CVE-2022-1862
- ALPINE:CVE-2022-1863
- ALPINE:CVE-2022-1864
- ALPINE:CVE-2022-1865
- ALPINE:CVE-2022-1866
- ALPINE:CVE-2022-1867
- ALPINE:CVE-2022-1868
- ALPINE:CVE-2022-1869
- ALPINE:CVE-2022-1870
- ALPINE:CVE-2022-1871
- ALPINE:CVE-2022-1872
- ALPINE:CVE-2022-1873
- ALPINE:CVE-2022-1874
- ALPINE:CVE-2022-1875
- ALPINE:CVE-2022-1876
- ALPINE:CVE-2022-2010
- ALPINE:CVE-2022-2156
- ALPINE:CVE-2022-2157
- ALPINE:CVE-2022-2158
- ALPINE:CVE-2022-2160
- ALPINE:CVE-2022-2161
- ALPINE:CVE-2022-2162
- ALPINE:CVE-2022-2163
- ALPINE:CVE-2022-2164
- ALPINE:CVE-2022-2165
- ASA-202106-31
- ASA-202106-32
- ASA-202106-45
- ASA-202112-6
- ASA-202112-7
- CISA-2021:1103
- CISA-2022:0328
- CISA-2022:0415
- DSA-5046-1
- DSA-5089-1
- DSA-5104-1
- DSA-5110-1
- DSA-5112-1
- DSA-5114-1
- DSA-5120-1
- DSA-5121-1
- DSA-5125-1
- DSA-5134-1
- DSA-5148-1
- DSA-5163-1
- DSA-5168-1
- DSA-5187-1
- FEDORA-2021-22594d9eb0
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-ca58c57bdf
- FEDORA-2021-f94dadff78
- FEDORA-2022-0102ccc2a2
- FEDORA-2022-0f14e2308e
- FEDORA-2022-17aa1c62da
- FEDORA-2022-1d3d5a0341
- FEDORA-2022-3ca063941b
- FEDORA-2022-3f28aa88cf
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-59297c8fcd
- FEDORA-2022-7416607232
- FEDORA-2022-8b0d8fb7da
- FEDORA-2022-b49c9bc07a
- FEDORA-2022-ba2c5339d4
- FEDORA-2022-bcb096166f
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-e39987b17d
- FEDORA-2022-e960d7e1b6
- FEDORA-2022-ecdf338eb1
- FREEBSD:18AC074C-579F-11EC-AAC7-3065EC8FD3EC
- FREEBSD:20B3AB21-C9DF-11EB-8558-3065EC8FD3EC
- FREEBSD:26F2123B-C6C6-11EC-B66F-3065EC8FD3EC
- FREEBSD:27CC4258-0805-11ED-8AC1-3065EC8FD3EC
- FREEBSD:323F900D-AC6D-11EC-A0B8-3065EC8FD3EC
- FREEBSD:40E2C35E-DB99-11EC-B0CF-3065EC8FD3EC
- FREEBSD:857BE71A-A4B0-11EC-95FC-3065EC8FD3EC
- FREEBSD:A25EA27B-BCED-11EC-87B5-3065EC8FD3EC
- FREEBSD:AB2D7F62-AF9D-11EC-A0B8-3065EC8FD3EC
- FREEBSD:AC91CF5E-D098-11EC-BEAD-3065EC8FD3EC
- FREEBSD:B2A4C5F1-F1FE-11EC-BCD2-3065EC8FD3EC
- FREEBSD:B582A85A-BA4A-11EC-8D1E-3065EC8FD3EC
- FREEBSD:C80CE2DD-E831-11EC-BCD2-3065EC8FD3EC
- FREEBSD:E0914087-9A09-11EC-9E61-3065EC8FD3EC
- FREEBSD:FE15F30A-B4C9-11EC-94A3-3065EC8FD3EC
- GLSA-202107-06
- GLSA-202208-35
- MS:CVE-2021-30551
- MS:CVE-2021-4052
- MS:CVE-2021-4053
- MS:CVE-2021-4054
- MS:CVE-2021-4055
- MS:CVE-2021-4056
- MS:CVE-2021-4057
- MS:CVE-2021-4058
- MS:CVE-2021-4059
- MS:CVE-2021-4061
- MS:CVE-2021-4062
- MS:CVE-2021-4063
- MS:CVE-2021-4064
- MS:CVE-2021-4065
- MS:CVE-2021-4066
- MS:CVE-2021-4067
- MS:CVE-2021-4068
- MS:CVE-2022-0789
- MS:CVE-2022-0790
- MS:CVE-2022-0791
- MS:CVE-2022-0792
- MS:CVE-2022-0793
- MS:CVE-2022-0794
- MS:CVE-2022-0795
- MS:CVE-2022-0796
- MS:CVE-2022-0797
- MS:CVE-2022-0798
- MS:CVE-2022-0799
- MS:CVE-2022-0800
- MS:CVE-2022-0801
- MS:CVE-2022-0802
- MS:CVE-2022-0803
- MS:CVE-2022-0804
- MS:CVE-2022-0805
- MS:CVE-2022-0806
- MS:CVE-2022-0807
- MS:CVE-2022-0808
- MS:CVE-2022-0809
- MS:CVE-2022-0971
- MS:CVE-2022-0972
- MS:CVE-2022-0973
- MS:CVE-2022-0974
- MS:CVE-2022-0975
- MS:CVE-2022-0976
- MS:CVE-2022-0977
- MS:CVE-2022-0978
- MS:CVE-2022-0979
- MS:CVE-2022-0980
- MS:CVE-2022-1096
- MS:CVE-2022-1125
- MS:CVE-2022-1127
- MS:CVE-2022-1128
- MS:CVE-2022-1129
- MS:CVE-2022-1130
- MS:CVE-2022-1131
- MS:CVE-2022-1133
- MS:CVE-2022-1134
- MS:CVE-2022-1135
- MS:CVE-2022-1136
- MS:CVE-2022-1137
- MS:CVE-2022-1138
- MS:CVE-2022-1139
- MS:CVE-2022-1143
- MS:CVE-2022-1145
- MS:CVE-2022-1146
- MS:CVE-2022-1232
- MS:CVE-2022-1305
- MS:CVE-2022-1306
- MS:CVE-2022-1307
- MS:CVE-2022-1308
- MS:CVE-2022-1309
- MS:CVE-2022-1310
- MS:CVE-2022-1312
- MS:CVE-2022-1313
- MS:CVE-2022-1314
- MS:CVE-2022-1364
- MS:CVE-2022-1477
- MS:CVE-2022-1478
- MS:CVE-2022-1479
- MS:CVE-2022-1480
- MS:CVE-2022-1481
- MS:CVE-2022-1482
- MS:CVE-2022-1483
- MS:CVE-2022-1484
- MS:CVE-2022-1485
- MS:CVE-2022-1486
- MS:CVE-2022-1487
- MS:CVE-2022-1488
- MS:CVE-2022-1490
- MS:CVE-2022-1491
- MS:CVE-2022-1492
- MS:CVE-2022-1493
- MS:CVE-2022-1494
- MS:CVE-2022-1495
- MS:CVE-2022-1497
- MS:CVE-2022-1498
- MS:CVE-2022-1499
- MS:CVE-2022-1500
- MS:CVE-2022-1501
- MS:CVE-2022-1634
- MS:CVE-2022-1635
- MS:CVE-2022-1636
- MS:CVE-2022-1637
- MS:CVE-2022-1639
- MS:CVE-2022-1640
- MS:CVE-2022-1853
- MS:CVE-2022-1854
- MS:CVE-2022-1855
- MS:CVE-2022-1856
- MS:CVE-2022-1857
- MS:CVE-2022-1858
- MS:CVE-2022-1859
- MS:CVE-2022-1862
- MS:CVE-2022-1863
- MS:CVE-2022-1864
- MS:CVE-2022-1865
- MS:CVE-2022-1867
- MS:CVE-2022-1868
- MS:CVE-2022-1869
- MS:CVE-2022-1870
- MS:CVE-2022-1871
- MS:CVE-2022-1872
- MS:CVE-2022-1873
- MS:CVE-2022-1874
- MS:CVE-2022-1875
- MS:CVE-2022-1876
- MS:CVE-2022-2007
- MS:CVE-2022-2010
- MS:CVE-2022-2011
- MS:CVE-2022-2156
- MS:CVE-2022-2157
- MS:CVE-2022-2158
- MS:CVE-2022-2160
- MS:CVE-2022-2161
- MS:CVE-2022-2162
- MS:CVE-2022-2163
- MS:CVE-2022-2164
- MS:CVE-2022-2165
- MS:CVE-2022-22021
- MS:CVE-2022-24475
- MS:CVE-2022-24523
- MS:CVE-2022-26891
- MS:CVE-2022-26894
- MS:CVE-2022-26895
- MS:CVE-2022-26900
- MS:CVE-2022-26905
- MS:CVE-2022-26908
- MS:CVE-2022-26909
- MS:CVE-2022-26912
- MS:CVE-2022-29144
- MS:CVE-2022-29146
- MS:CVE-2022-29147
- MS:CVE-2022-30127
- MS:CVE-2022-30128
- MS:CVE-2022-30192
- MS:CVE-2022-33638
- MS:CVE-2022-33639
- openSUSE-SU-2021:0881-1
- openSUSE-SU-2021:0938-1
- openSUSE-SU-2021:0948-1
- openSUSE-SU-2021:0949-1
- openSUSE-SU-2021:1582-1
- openSUSE-SU-2021:1632-1
- openSUSE-SU-2022:0047-1
- openSUSE-SU-2022:0075-1
- openSUSE-SU-2022:0085-1
- openSUSE-SU-2022:0103-1
- openSUSE-SU-2022:0110-1
- openSUSE-SU-2022:0114-1
- openSUSE-SU-2022:0123-1
- openSUSE-SU-2022:0125-1
- openSUSE-SU-2022:0133-1
- openSUSE-SU-2022:0147-1
- openSUSE-SU-2022:0156-1
- USN-5350-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:ebuild/www-client/microsoft-edge?distro=gentoo | www-client | microsoft-edge | < 101.0.1210.47 | gentoo | ||
Unaffected | pkg:ebuild/www-client/microsoft-edge?distro=gentoo | www-client | microsoft-edge | >= 101.0.1210.47 | gentoo | ||
Affected | pkg:ebuild/www-client/google-chrome?distro=gentoo | www-client | google-chrome | < 103.0.5060.53 | gentoo | ||
Unaffected | pkg:ebuild/www-client/google-chrome?distro=gentoo | www-client | google-chrome | >= 103.0.5060.53 | gentoo | ||
Affected | pkg:ebuild/www-client/chromium?distro=gentoo | www-client | chromium | < 103.0.5060.53 | gentoo | ||
Unaffected | pkg:ebuild/www-client/chromium?distro=gentoo | www-client | chromium | >= 103.0.5060.53 | gentoo | ||
Affected | pkg:ebuild/dev-qt/qtwebengine?distro=gentoo | dev-qt | qtwebengine | < 5.15.5_p20220618 | gentoo | ||
Unaffected | pkg:ebuild/dev-qt/qtwebengine?distro=gentoo | dev-qt | qtwebengine | >= 5.15.5_p20220618 | gentoo |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |