<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for chromium</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2022:10138-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-10-03T10:34:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-10-03T10:34:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-10-03T10:34:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for chromium</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for chromium fixes the following issues:

Chromium 106.0.5249.91 (boo#1203808):

* CVE-2022-3370: Use after free in Custom Elements
* CVE-2022-3373: Out of bounds write in V8

includes changes from 106.0.5249.61:

* CVE-2022-3304: Use after free in CSS
* CVE-2022-3201: Insufficient validation of untrusted input in Developer Tools
* CVE-2022-3305: Use after free in Survey
* CVE-2022-3306: Use after free in Survey
* CVE-2022-3307: Use after free in Media
* CVE-2022-3308: Insufficient policy enforcement in Developer Tools
* CVE-2022-3309: Use after free in Assistant
* CVE-2022-3310: Insufficient policy enforcement in Custom Tabs
* CVE-2022-3311: Use after free in Import
* CVE-2022-3312: Insufficient validation of untrusted input in VPN
* CVE-2022-3313: Incorrect security UI in Full Screen
* CVE-2022-3314: Use after free in Logging
* CVE-2022-3315: Type confusion in Blink
* CVE-2022-3316: Insufficient validation of untrusted input in Safe Browsing
* CVE-2022-3317: Insufficient validation of untrusted input in Intents
* CVE-2022-3318: Use after free in ChromeOS Notifications
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2022-10138</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      <Description>E-Mail link for openSUSE-SU-2022:10138-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203808</URL>
      <Description>SUSE Bug 1203808</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3201/</URL>
      <Description>SUSE CVE CVE-2022-3201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3304/</URL>
      <Description>SUSE CVE CVE-2022-3304 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3305/</URL>
      <Description>SUSE CVE CVE-2022-3305 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3306/</URL>
      <Description>SUSE CVE CVE-2022-3306 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3307/</URL>
      <Description>SUSE CVE CVE-2022-3307 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3308/</URL>
      <Description>SUSE CVE CVE-2022-3308 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3309/</URL>
      <Description>SUSE CVE CVE-2022-3309 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3310/</URL>
      <Description>SUSE CVE CVE-2022-3310 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3311/</URL>
      <Description>SUSE CVE CVE-2022-3311 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3312/</URL>
      <Description>SUSE CVE CVE-2022-3312 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3313/</URL>
      <Description>SUSE CVE CVE-2022-3313 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3314/</URL>
      <Description>SUSE CVE CVE-2022-3314 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3315/</URL>
      <Description>SUSE CVE CVE-2022-3315 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3316/</URL>
      <Description>SUSE CVE CVE-2022-3316 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3317/</URL>
      <Description>SUSE CVE CVE-2022-3317 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3318/</URL>
      <Description>SUSE CVE CVE-2022-3318 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3370/</URL>
      <Description>SUSE CVE CVE-2022-3370 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3373/</URL>
      <Description>SUSE CVE CVE-2022-3373 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP4">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP4">
        <FullProductName ProductID="SUSE Package Hub 15 SP4">SUSE Package Hub 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="chromedriver-106.0.5249.91-bp154.2.32.1">
      <FullProductName ProductID="chromedriver-106.0.5249.91-bp154.2.32.1">chromedriver-106.0.5249.91-bp154.2.32.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="chromium-106.0.5249.91-bp154.2.32.1">
      <FullProductName ProductID="chromium-106.0.5249.91-bp154.2.32.1">chromium-106.0.5249.91-bp154.2.32.1</FullProductName>
    </Branch>
    <Relationship ProductReference="chromedriver-106.0.5249.91-bp154.2.32.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP4">
      <FullProductName ProductID="SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1">chromedriver-106.0.5249.91-bp154.2.32.1 as a component of SUSE Package Hub 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-106.0.5249.91-bp154.2.32.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP4">
      <FullProductName ProductID="SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1">chromium-106.0.5249.91-bp154.2.32.1 as a component of SUSE Package Hub 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromedriver-106.0.5249.91-bp154.2.32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1">chromedriver-106.0.5249.91-bp154.2.32.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="chromium-106.0.5249.91-bp154.2.32.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1">chromium-106.0.5249.91-bp154.2.32.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validation of untrusted input in DevTools in Google Chrome on Chrome OS prior to 105.0.5195.125 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2022-3201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3201.html</URL>
        <Description>CVE-2022-3201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203419</URL>
        <Description>SUSE Bug 1203419</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in CSS in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2022-3304</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3304.html</URL>
        <Description>CVE-2022-3304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2022-3305</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3305.html</URL>
        <Description>CVE-2022-3305</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2022-3306</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3306.html</URL>
        <Description>CVE-2022-3306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in media in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2022-3307</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3307.html</URL>
        <Description>CVE-2022-3307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in developer tools in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2022-3308</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3308.html</URL>
        <Description>CVE-2022-3308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in assistant in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2022-3309</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3309.html</URL>
        <Description>CVE-2022-3309</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in custom tabs in Google Chrome on Android prior to 106.0.5249.62 allowed an attacker who convinced the user to install an application to bypass same origin policy via a crafted application. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2022-3310</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3310.html</URL>
        <Description>CVE-2022-3310</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in import in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2022-3311</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3311.html</URL>
        <Description>CVE-2022-3311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validation of untrusted input in VPN in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a local attacker to bypass managed device restrictions via physical access to the device. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2022-3312</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3312.html</URL>
        <Description>CVE-2022-3312</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect security UI in full screen in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2022-3313</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3313.html</URL>
        <Description>CVE-2022-3313</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in logging in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2022-3314</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3314.html</URL>
        <Description>CVE-2022-3314</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Type confusion in Blink in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)</Note>
    </Notes>
    <CVE>CVE-2022-3315</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3315.html</URL>
        <Description>CVE-2022-3315</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass security feature via a crafted HTML page. (Chromium security severity: Low)</Note>
    </Notes>
    <CVE>CVE-2022-3316</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3316.html</URL>
        <Description>CVE-2022-3316</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 106.0.5249.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)</Note>
    </Notes>
    <CVE>CVE-2022-3317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3317.html</URL>
        <Description>CVE-2022-3317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in ChromeOS Notifications in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to reboot Chrome OS to potentially exploit heap corruption via UI interaction. (Chromium security severity: Low)</Note>
    </Notes>
    <CVE>CVE-2022-3318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3318.html</URL>
        <Description>CVE-2022-3318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203808</URL>
        <Description>SUSE Bug 1203808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in Custom Elements in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2022-3370</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3370.html</URL>
        <Description>CVE-2022-3370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out of bounds write in V8 in Google Chrome prior to 106.0.5249.91 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2022-3373</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromedriver-106.0.5249.91-bp154.2.32.1</ProductID>
        <ProductID>openSUSE Leap 15.4:chromium-106.0.5249.91-bp154.2.32.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZBW4AE4VW4MIHPWQLMJEIBGACVXWAFW/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3373.html</URL>
        <Description>CVE-2022-3373</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
