Insufficient data validation in URL formatting in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "chromium-browser", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-browser-dbgsym", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-browser-l10n", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-chromedriver", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-chromedriver-dbgsym", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg-dbgsym", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg-extra", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg-extra-dbgsym", "binary_version": "103.0.5060.134-0ubuntu0.18.04.1" } ] }