CVE-2022-2165

Publication date 28 July 2022

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

4.3 · Medium

Score breakdown

Insufficient data validation in URL formatting in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.

Read the notes from the security team

Status

Package Ubuntu Release Status
chromium-browser 22.10 kinetic
Not affected
22.04 LTS jammy
Not affected
21.10 impish
Not affected
20.04 LTS focal
Not affected
18.04 LTS bionic
Fixed 103.0.5060.134-0ubuntu0.18.04.1
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Not in release

Notes


alexmurray

The Debian chromium source package is called chromium-browser in Ubuntu


mdeslaur

starting with Ubuntu 19.10, the chromium-browser package is just a script that installs the Chromium snap

Severity score breakdown

Parameter Value
Base score 4.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N