Overview

Request 1113938 accepted

- Chromium 117.0.5938.132 (boo#1215776):
* CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx (boo#1215778)
* CVE-2023-5186: Use after free in Passwords
* CVE-2023-5187: Use after free in Extensions

Loading...

Robert Frohl's avatar

It would be good if this update reaches users as fast as possible.

Request History
Andreas Stieger's avatar

AndreasStieger created request

- Chromium 117.0.5938.132 (boo#1215776):
* CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx (boo#1215778)
* CVE-2023-5186: Use after free in Passwords
* CVE-2023-5187: Use after free in Extensions


Andreas Stieger's avatar

AndreasStieger changed priority to moderate => critical

exploit in the wold


Factory Auto's avatar

factory-auto added opensuse-review-team as a reviewer

Please review sources


Staging Bot's avatar

staging-bot added openSUSE:Factory:Staging:adi:1 as a reviewer

Being evaluated by staging project "openSUSE:Factory:Staging:adi:1"


Staging Bot's avatar

staging-bot accepted review

Picked "openSUSE:Factory:Staging:adi:1"


Saul Goodman's avatar

licensedigger accepted review

ok


Factory Auto's avatar

factory-auto accepted review

Check script succeeded


Dominique Leuenberger's avatar

dimstar accepted review


Dominique Leuenberger's avatar

dimstar_suse added factory-staging as a reviewer

Being evaluated by group "factory-staging"


Dominique Leuenberger's avatar

dimstar_suse accepted review

Unstaged from project "openSUSE:Factory:Staging:adi:1"


Dominique Leuenberger's avatar

dimstar_suse accepted request

rapid-xin

openSUSE Build Service is sponsored by