ALT-PU-2023-1047-1
Closed vulnerabilities
BDU:2022-07153
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-07256
Уязвимость компонента Blink Media браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-07258
Уязвимость IPC-библиотеки Mojo браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-07315
Уязвимость компонента Blink Frames браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-07321
Уязвимость компонента Profiles браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2023-00071
Уязвимость функции Overview Mode браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2023-00166
Уязвимость сетевой службы браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
BDU:2023-00533
Уязвимость реализации всплывающих окон с запросом на разрешение браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2023-00534
Уязвимость реализации прикладного программного интерфейса File System браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти ограничения безопасности
BDU:2023-00537
Уязвимость механизма «Downloads» («Загрузки») браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти ограничения безопасности
Modified: 2025-02-19
CVE-2022-4262
Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2024-11-21
CVE-2022-4436
Use after free in Blink Media in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
- https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html
- https://crbug.com/1383991
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html
- https://crbug.com/1383991
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2024-11-21
CVE-2022-4437
Use after free in Mojo IPC in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
- https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html
- https://crbug.com/1394692
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html
- https://crbug.com/1394692
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2024-11-21
CVE-2022-4438
Use after free in Blink Frames in Google Chrome prior to 108.0.5359.124 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
- https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html
- https://crbug.com/1381871
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html
- https://crbug.com/1381871
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2024-11-21
CVE-2022-4440
Use after free in Profiles in Google Chrome prior to 108.0.5359.124 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
- https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html
- https://crbug.com/1382761
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop_13.html
- https://crbug.com/1382761
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-05-05
CVE-2023-0128
Use after free in Overview Mode in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1353208
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1353208
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-05-05
CVE-2023-0129
Heap buffer overflow in Network Service in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and specific interactions. (Chromium security severity: High)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1382033
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1382033
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-03-20
CVE-2023-0130
Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1370028
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1370028
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-03-20
CVE-2023-0131
Inappropriate implementation in in iframe Sandbox in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to bypass file download restrictions via a crafted HTML page. (Chromium security severity: Medium)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1357366
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1357366
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-03-20
CVE-2023-0132
Inappropriate implementation in in Permission prompts in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to force acceptance of a permission prompt via a crafted HTML page. (Chromium security severity: Medium)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1371215
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1371215
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-03-20
CVE-2023-0133
Inappropriate implementation in in Permission prompts in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to bypass main origin permission delegation via a crafted HTML page. (Chromium security severity: Medium)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1375132
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1375132
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-05-05
CVE-2023-0134
Use after free in Cart in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1385709
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1385709
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-05-05
CVE-2023-0135
Use after free in Cart in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via database corruption and a crafted HTML page. (Chromium security severity: Medium)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1385831
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1385831
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-05-05
CVE-2023-0136
Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to execute incorrect security UI via a crafted HTML page. (Chromium security severity: Medium)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1356987
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1356987
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-05-05
CVE-2023-0137
Heap buffer overflow in Platform Apps in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1399904
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1399904
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-05-05
CVE-2023-0138
Heap buffer overflow in libphonenumber in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1346675
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1346675
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2024-11-21
CVE-2023-0139
Insufficient validation of untrusted input in Downloads in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass download restrictions via a crafted HTML page. (Chromium security severity: Low)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1367632
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1367632
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2024-11-21
CVE-2023-0140
Inappropriate implementation in in File System API in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Low)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1326788
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1326788
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
Modified: 2025-03-20
CVE-2023-0141
Insufficient policy enforcement in CORS in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1362331
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11
- https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
- https://crbug.com/1362331
- https://security.gentoo.org/glsa/202305-10
- https://security.gentoo.org/glsa/202311-11