{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for chromium","title":"Title of the patch"},{"category":"description","text":"This update for chromium fixes the following issues:\n\nChromium 92.0.4515.131 (boo#1189006)\n\n* CVE-2021-30590: Heap buffer overflow in Bookmarks\n* CVE-2021-30591: Use after free in File System API\n* CVE-2021-30592: Out of bounds write in Tab Groups\n* CVE-2021-30593: Out of bounds read in Tab Strip\n* CVE-2021-30594: Use after free in Page Info UI\n* CVE-2021-30596: Incorrect security UI in Navigation\n* CVE-2021-30597: Use after free in Browser UI\n\nChromium 92.0.4515.107 (boo#1188590)\n\n* CVE-2021-30565: Out of bounds write in Tab Groups\n* CVE-2021-30566: Stack buffer overflow in Printing\n* CVE-2021-30567: Use after free in DevTools\n* CVE-2021-30568: Heap buffer overflow in WebGL\n* CVE-2021-30569: Use after free in sqlite\n* CVE-2021-30571: Insufficient policy enforcement in DevTools\n* CVE-2021-30572: Use after free in Autofill\n* CVE-2021-30573: Use after free in GPU\n* CVE-2021-30574: Use after free in protocol handling\n* CVE-2021-30575: Out of bounds read in Autofill\n* CVE-2021-30576: Use after free in DevTools\n* CVE-2021-30577: Insufficient policy enforcement in Installer\n* CVE-2021-30578: Uninitialized Use in Media\n* CVE-2021-30579: Use after free in UI framework\n* CVE-2021-30581: Use after free in DevTools\n* CVE-2021-30582: Inappropriate implementation in Animation\n* CVE-2021-30584: Incorrect security UI in Downloads\n* CVE-2021-30585: Use after free in sensor handling\n* CVE-2021-30588: Type Confusion in V8\n* CVE-2021-30589: Insufficient validation of untrusted input in Sharing\n\n","title":"Description of the patch"},{"category":"details","text":"openSUSE-2021-1144","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1144-1.json"},{"category":"self","summary":"URL for openSUSE-SU-2021:1144-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/"},{"category":"self","summary":"E-Mail link for openSUSE-SU-2021:1144-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXI3OZYD3ADIBS3KBG3HYP2WXAJHKIDA/"},{"category":"self","summary":"SUSE Bug 1188590","url":"https://bugzilla.suse.com/1188590"},{"category":"self","summary":"SUSE Bug 1189006","url":"https://bugzilla.suse.com/1189006"},{"category":"self","summary":"SUSE CVE CVE-2021-30565 page","url":"https://www.suse.com/security/cve/CVE-2021-30565/"},{"category":"self","summary":"SUSE CVE CVE-2021-30566 page","url":"https://www.suse.com/security/cve/CVE-2021-30566/"},{"category":"self","summary":"SUSE CVE CVE-2021-30567 page","url":"https://www.suse.com/security/cve/CVE-2021-30567/"},{"category":"self","summary":"SUSE CVE CVE-2021-30568 page","url":"https://www.suse.com/security/cve/CVE-2021-30568/"},{"category":"self","summary":"SUSE CVE CVE-2021-30569 page","url":"https://www.suse.com/security/cve/CVE-2021-30569/"},{"category":"self","summary":"SUSE CVE CVE-2021-30571 page","url":"https://www.suse.com/security/cve/CVE-2021-30571/"},{"category":"self","summary":"SUSE CVE CVE-2021-30572 page","url":"https://www.suse.com/security/cve/CVE-2021-30572/"},{"category":"self","summary":"SUSE CVE CVE-2021-30573 page","url":"https://www.suse.com/security/cve/CVE-2021-30573/"},{"category":"self","summary":"SUSE CVE CVE-2021-30574 page","url":"https://www.suse.com/security/cve/CVE-2021-30574/"},{"category":"self","summary":"SUSE CVE CVE-2021-30575 page","url":"https://www.suse.com/security/cve/CVE-2021-30575/"},{"category":"self","summary":"SUSE CVE CVE-2021-30576 page","url":"https://www.suse.com/security/cve/CVE-2021-30576/"},{"category":"self","summary":"SUSE CVE CVE-2021-30577 page","url":"https://www.suse.com/security/cve/CVE-2021-30577/"},{"category":"self","summary":"SUSE CVE CVE-2021-30578 page","url":"https://www.suse.com/security/cve/CVE-2021-30578/"},{"category":"self","summary":"SUSE CVE CVE-2021-30579 page","url":"https://www.suse.com/security/cve/CVE-2021-30579/"},{"category":"self","summary":"SUSE CVE CVE-2021-30581 page","url":"https://www.suse.com/security/cve/CVE-2021-30581/"},{"category":"self","summary":"SUSE CVE CVE-2021-30582 page","url":"https://www.suse.com/security/cve/CVE-2021-30582/"},{"category":"self","summary":"SUSE CVE CVE-2021-30584 page","url":"https://www.suse.com/security/cve/CVE-2021-30584/"},{"category":"self","summary":"SUSE CVE CVE-2021-30585 page","url":"https://www.suse.com/security/cve/CVE-2021-30585/"},{"category":"self","summary":"SUSE CVE CVE-2021-30588 page","url":"https://www.suse.com/security/cve/CVE-2021-30588/"},{"category":"self","summary":"SUSE CVE CVE-2021-30589 page","url":"https://www.suse.com/security/cve/CVE-2021-30589/"},{"category":"self","summary":"SUSE CVE CVE-2021-30590 page","url":"https://www.suse.com/security/cve/CVE-2021-30590/"},{"category":"self","summary":"SUSE CVE CVE-2021-30591 page","url":"https://www.suse.com/security/cve/CVE-2021-30591/"},{"category":"self","summary":"SUSE CVE CVE-2021-30592 page","url":"https://www.suse.com/security/cve/CVE-2021-30592/"},{"category":"self","summary":"SUSE CVE CVE-2021-30593 page","url":"https://www.suse.com/security/cve/CVE-2021-30593/"},{"category":"self","summary":"SUSE CVE CVE-2021-30594 page","url":"https://www.suse.com/security/cve/CVE-2021-30594/"},{"category":"self","summary":"SUSE CVE CVE-2021-30596 page","url":"https://www.suse.com/security/cve/CVE-2021-30596/"},{"category":"self","summary":"SUSE CVE CVE-2021-30597 page","url":"https://www.suse.com/security/cve/CVE-2021-30597/"}],"title":"Security update for chromium","tracking":{"current_release_date":"2021-08-10T22:40:35Z","generator":{"date":"2021-08-10T22:40:35Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2021:1144-1","initial_release_date":"2021-08-10T22:40:35Z","revision_history":[{"date":"2021-08-10T22:40:35Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","product":{"name":"chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","product_id":"chromedriver-92.0.4515.131-bp153.2.19.1.aarch64"}},{"category":"product_version","name":"chromium-92.0.4515.131-bp153.2.19.1.aarch64","product":{"name":"chromium-92.0.4515.131-bp153.2.19.1.aarch64","product_id":"chromium-92.0.4515.131-bp153.2.19.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","product":{"name":"chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","product_id":"chromedriver-92.0.4515.131-bp153.2.19.1.x86_64"}},{"category":"product_version","name":"chromium-92.0.4515.131-bp153.2.19.1.x86_64","product":{"name":"chromium-92.0.4515.131-bp153.2.19.1.x86_64","product_id":"chromium-92.0.4515.131-bp153.2.19.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Package Hub 15 SP3","product":{"name":"SUSE Package Hub 15 SP3","product_id":"SUSE Package Hub 15 SP3"}},{"category":"product_name","name":"openSUSE Leap 15.3","product":{"name":"openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.3"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"chromedriver-92.0.4515.131-bp153.2.19.1.aarch64 as component of SUSE Package Hub 15 SP3","product_id":"SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64"},"product_reference":"chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","relates_to_product_reference":"SUSE Package Hub 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"chromedriver-92.0.4515.131-bp153.2.19.1.x86_64 as component of SUSE Package Hub 15 SP3","product_id":"SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64"},"product_reference":"chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","relates_to_product_reference":"SUSE Package Hub 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"chromium-92.0.4515.131-bp153.2.19.1.aarch64 as component of SUSE Package Hub 15 SP3","product_id":"SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64"},"product_reference":"chromium-92.0.4515.131-bp153.2.19.1.aarch64","relates_to_product_reference":"SUSE Package Hub 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"chromium-92.0.4515.131-bp153.2.19.1.x86_64 as component of SUSE Package Hub 15 SP3","product_id":"SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"},"product_reference":"chromium-92.0.4515.131-bp153.2.19.1.x86_64","relates_to_product_reference":"SUSE Package Hub 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"chromedriver-92.0.4515.131-bp153.2.19.1.aarch64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64"},"product_reference":"chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"chromedriver-92.0.4515.131-bp153.2.19.1.x86_64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64"},"product_reference":"chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"chromium-92.0.4515.131-bp153.2.19.1.aarch64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64"},"product_reference":"chromium-92.0.4515.131-bp153.2.19.1.aarch64","relates_to_product_reference":"openSUSE Leap 15.3"},{"category":"default_component_of","full_product_name":{"name":"chromium-92.0.4515.131-bp153.2.19.1.x86_64 as component of openSUSE Leap 15.3","product_id":"openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"},"product_reference":"chromium-92.0.4515.131-bp153.2.19.1.x86_64","relates_to_product_reference":"openSUSE Leap 15.3"}]},"vulnerabilities":[{"cve":"CVE-2021-30565","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30565"}],"notes":[{"category":"general","text":"Out of bounds write in Tab Groups in Google Chrome on Linux and ChromeOS prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30565","url":"https://www.suse.com/security/cve/CVE-2021-30565"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30565"},{"cve":"CVE-2021-30566","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30566"}],"notes":[{"category":"general","text":"Stack buffer overflow in Printing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit stack corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30566","url":"https://www.suse.com/security/cve/CVE-2021-30566"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30566"},{"cve":"CVE-2021-30567","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30567"}],"notes":[{"category":"general","text":"Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to open DevTools to potentially exploit heap corruption via specific user gesture.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30567","url":"https://www.suse.com/security/cve/CVE-2021-30567"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30567"},{"cve":"CVE-2021-30568","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30568"}],"notes":[{"category":"general","text":"Heap buffer overflow in WebGL in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30568","url":"https://www.suse.com/security/cve/CVE-2021-30568"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30568"},{"cve":"CVE-2021-30569","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30569"}],"notes":[{"category":"general","text":"Use after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30569","url":"https://www.suse.com/security/cve/CVE-2021-30569"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30569"},{"cve":"CVE-2021-30571","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30571"}],"notes":[{"category":"general","text":"Insufficient policy enforcement in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30571","url":"https://www.suse.com/security/cve/CVE-2021-30571"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30571"},{"cve":"CVE-2021-30572","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30572"}],"notes":[{"category":"general","text":"Use after free in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30572","url":"https://www.suse.com/security/cve/CVE-2021-30572"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30572"},{"cve":"CVE-2021-30573","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30573"}],"notes":[{"category":"general","text":"Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30573","url":"https://www.suse.com/security/cve/CVE-2021-30573"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30573"},{"cve":"CVE-2021-30574","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30574"}],"notes":[{"category":"general","text":"Use after free in protocol handling in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30574","url":"https://www.suse.com/security/cve/CVE-2021-30574"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30574"},{"cve":"CVE-2021-30575","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30575"}],"notes":[{"category":"general","text":"Out of bounds write in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30575","url":"https://www.suse.com/security/cve/CVE-2021-30575"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30575"},{"cve":"CVE-2021-30576","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30576"}],"notes":[{"category":"general","text":"Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30576","url":"https://www.suse.com/security/cve/CVE-2021-30576"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30576"},{"cve":"CVE-2021-30577","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30577"}],"notes":[{"category":"general","text":"Insufficient policy enforcement in Installer in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform local privilege escalation via a crafted file.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30577","url":"https://www.suse.com/security/cve/CVE-2021-30577"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30577"},{"cve":"CVE-2021-30578","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30578"}],"notes":[{"category":"general","text":"Uninitialized use in Media in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30578","url":"https://www.suse.com/security/cve/CVE-2021-30578"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30578"},{"cve":"CVE-2021-30579","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30579"}],"notes":[{"category":"general","text":"Use after free in UI framework in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30579","url":"https://www.suse.com/security/cve/CVE-2021-30579"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30579"},{"cve":"CVE-2021-30581","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30581"}],"notes":[{"category":"general","text":"Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30581","url":"https://www.suse.com/security/cve/CVE-2021-30581"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30581"},{"cve":"CVE-2021-30582","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30582"}],"notes":[{"category":"general","text":"Inappropriate implementation in Animation in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30582","url":"https://www.suse.com/security/cve/CVE-2021-30582"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30582"},{"cve":"CVE-2021-30584","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30584"}],"notes":[{"category":"general","text":"Incorrect security UI in Downloads in Google Chrome on Android prior to 92.0.4515.107 allowed a remote attacker to perform domain spoofing via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30584","url":"https://www.suse.com/security/cve/CVE-2021-30584"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30584"},{"cve":"CVE-2021-30585","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30585"}],"notes":[{"category":"general","text":"Use after free in sensor handling in Google Chrome on Windows prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30585","url":"https://www.suse.com/security/cve/CVE-2021-30585"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30585"},{"cve":"CVE-2021-30588","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30588"}],"notes":[{"category":"general","text":"Type confusion in V8 in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30588","url":"https://www.suse.com/security/cve/CVE-2021-30588"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"low"}],"title":"CVE-2021-30588"},{"cve":"CVE-2021-30589","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30589"}],"notes":[{"category":"general","text":"Insufficient validation of untrusted input in Sharing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to bypass navigation restrictions via a crafted click-to-call link.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30589","url":"https://www.suse.com/security/cve/CVE-2021-30589"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30589"},{"cve":"CVE-2021-30590","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30590"}],"notes":[{"category":"general","text":"Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30590","url":"https://www.suse.com/security/cve/CVE-2021-30590"},{"category":"external","summary":"SUSE Bug 1189006 for CVE-2021-30590","url":"https://bugzilla.suse.com/1189006"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30590"},{"cve":"CVE-2021-30591","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30591"}],"notes":[{"category":"general","text":"Use after free in File System API in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30591","url":"https://www.suse.com/security/cve/CVE-2021-30591"},{"category":"external","summary":"SUSE Bug 1189006 for CVE-2021-30591","url":"https://bugzilla.suse.com/1189006"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30591"},{"cve":"CVE-2021-30592","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30592"}],"notes":[{"category":"general","text":"Out of bounds write in Tab Groups in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30592","url":"https://www.suse.com/security/cve/CVE-2021-30592"},{"category":"external","summary":"SUSE Bug 1189006 for CVE-2021-30592","url":"https://bugzilla.suse.com/1189006"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30592"},{"cve":"CVE-2021-30593","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30593"}],"notes":[{"category":"general","text":"Out of bounds read in Tab Strip in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30593","url":"https://www.suse.com/security/cve/CVE-2021-30593"},{"category":"external","summary":"SUSE Bug 1189006 for CVE-2021-30593","url":"https://bugzilla.suse.com/1189006"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30593"},{"cve":"CVE-2021-30594","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30594"}],"notes":[{"category":"general","text":"Use after free in Page Info UI in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30594","url":"https://www.suse.com/security/cve/CVE-2021-30594"},{"category":"external","summary":"SUSE Bug 1189006 for CVE-2021-30594","url":"https://bugzilla.suse.com/1189006"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30594"},{"cve":"CVE-2021-30596","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30596"}],"notes":[{"category":"general","text":"Incorrect security UI in Navigation in Google Chrome on Android prior to 92.0.4515.131 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30596","url":"https://www.suse.com/security/cve/CVE-2021-30596"},{"category":"external","summary":"SUSE Bug 1189006 for CVE-2021-30596","url":"https://bugzilla.suse.com/1189006"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"},"products":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30596"},{"cve":"CVE-2021-30597","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-30597"}],"notes":[{"category":"general","text":"Use after free in Browser UI in Google Chrome on Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-30597","url":"https://www.suse.com/security/cve/CVE-2021-30597"},{"category":"external","summary":"SUSE Bug 1189006 for CVE-2021-30597","url":"https://bugzilla.suse.com/1189006"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","SUSE Package Hub 15 SP3:chromium-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromedriver-92.0.4515.131-bp153.2.19.1.x86_64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.aarch64","openSUSE Leap 15.3:chromium-92.0.4515.131-bp153.2.19.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-08-10T22:40:35Z","details":"moderate"}],"title":"CVE-2021-30597"}]}