Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities — GLSA 202309-17

Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.

Affected packages

www-client/chromium on all architectures
Affected versions < 113.0.5672.126
Unaffected versions >= 113.0.5672.126
www-client/chromium-bin on all architectures
Affected versions < 113.0.5672.126
Unaffected versions
www-client/google-chrome on all architectures
Affected versions < 113.0.5672.126
Unaffected versions >= 113.0.5672.126
www-client/microsoft-edge on all architectures
Affected versions < 113.0.1774.50
Unaffected versions >= 113.0.1774.50

Background

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Google Chrome is one fast, simple, and secure browser for all your devices. Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

Description

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All Chromium users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/chromium-113.0.5672.126"
 

All Google Chrome users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/google-chrome-113.0.5672.126"
 

All Microsoft Edge users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-113.0.1774.50"
 

Gentoo has discontinued support for www-client/chromium-bin. Users should unmerge it in favor of the above alternatives:

 # emerge --ask --depclean --verbose "www-client/chromium-bin"
 

References

Release date
September 30, 2023

Latest revision
September 30, 2023: 1

Severity
high

Exploitable
remote

Bugzilla entries