Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-30627 (GCVE-0-2021-30627)
Vulnerability from cvelistv5 – Published: 2021-10-08 20:50 – Updated: 2024-08-03 22:40- Type Confusion
| URL | Tags |
|---|---|
| https://chromereleases.googleblog.com/2021/09/sta… | x_refsource_MISC |
| https://crbug.com/1245786 | x_refsource_MISC |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:40:31.725Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://crbug.com/1245786"
},
{
"name": "FEDORA-2021-ab09a05562",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "93.0.4577.82",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Type Confusion",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-30T01:08:57.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://crbug.com/1245786"
},
{
"name": "FEDORA-2021-ab09a05562",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2021-30627",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "93.0.4577.82"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Type Confusion"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1245786",
"refsource": "MISC",
"url": "https://crbug.com/1245786"
},
{
"name": "FEDORA-2021-ab09a05562",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2021-30627",
"datePublished": "2021-10-08T20:50:21.000Z",
"dateReserved": "2021-04-13T00:00:00.000Z",
"dateUpdated": "2024-08-03T22:40:31.725Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-30627",
"date": "2026-05-19",
"epss": "0.0088",
"percentile": "0.7557"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"93.0.4577.82\", \"matchCriteriaId\": \"B5BE60BD-114C-4278-9F01-065274D86699\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"}, {\"lang\": \"es\", \"value\": \"Una confusi\\u00f3n de tipo en el dise\\u00f1o de Blink en Google Chrome versiones anteriores a 93.0.4577.82, permit\\u00eda a un atacante remoto explotar potencialmente una corrupci\\u00f3n de la pila por medio de una p\\u00e1gina HTML dise\\u00f1ada\"}]",
"id": "CVE-2021-30627",
"lastModified": "2024-11-21T06:04:19.440",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-10-08T21:15:07.420",
"references": "[{\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1245786\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1245786\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-843\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-30627\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2021-10-08T21:15:07.420\",\"lastModified\":\"2024-11-21T06:04:19.440\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Una confusi\u00f3n de tipo en el dise\u00f1o de Blink en Google Chrome versiones anteriores a 93.0.4577.82, permit\u00eda a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"93.0.4577.82\",\"matchCriteriaId\":\"B5BE60BD-114C-4278-9F01-065274D86699\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}],\"references\":[{\"url\":\"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1245786\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1245786\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2021-AVI-701
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 93.0.4577.82",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30632"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 13 septembre 2021",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2021-AVI-716
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge (basé sur Chromium). Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 93.0.961.52",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-716",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge\n(bas\u00e9 sur Chromium). Elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30627 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30627"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30629 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30629"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30625 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30625"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30628 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30628"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30631 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30631"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30633 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30633"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30626 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30626"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30630 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30630"
}
]
}
CERTFR-2021-AVI-701
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 93.0.4577.82",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30632"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 13 septembre 2021",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2021-AVI-716
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge (basé sur Chromium). Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 93.0.961.52",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-716",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge\n(bas\u00e9 sur Chromium). Elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30627 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30627"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30629 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30629"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30625 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30625"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30628 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30628"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30631 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30631"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30633 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30633"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30626 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30626"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30630 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30630"
}
]
}
BDU:2021-04772
Vulnerability from fstec - Published: 01.09.2021{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Google Inc, Microsoft Corp, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), \u0434\u043e 93.0.4577.82 (Google Chrome), \u0434\u043e 93.0.961.52 (Microsoft Edge), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.3 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Google Chrome:\nhttps://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\n\n\u0414\u043b\u044f Microsoft Edge:\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-30627\n\n\u0414\u043b\u044f Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2021-1126SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0114SE47\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 94.0.4606.81+repack-1osnova1.1\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "01.09.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.09.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-04772",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-30627",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Google Chrome, Microsoft Edge, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 \u043c\u0430\u043a\u0435\u0442\u0430 \u043c\u043e\u0434\u0443\u043b\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f Blink \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0414\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0443 \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u044b\u0435 \u0442\u0438\u043f\u044b (CWE-843)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 \u043c\u0430\u043a\u0435\u0442\u0430 \u043c\u043e\u0434\u0443\u043b\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f Blink \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0442\u0438\u043f\u043e\u0432 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0439 \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-30627\nhttps://www.cybersecurity-help.cz/vdb/SB2021091704\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2021-1126SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0114SE47\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.3/\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-843",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2021-92834
Vulnerability from cnvd - Published: 2021-12-01厂商已发布了漏洞修复程序,请及时关注更新: https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
| Name | Google Chrome <93.0.4577.82 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-30627",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-30627"
}
},
"description": "Chrome\u662f\u7531Google\u5f00\u53d1\u7684\u4e00\u6b3e\u8bbe\u8ba1\u7b80\u5355\u3001\u9ad8\u6548\u7684Web\u6d4f\u89c8\u5de5\u5177\u3002\n\nGoogle Chrome 93.0.4577.82\u4e4b\u524d\u7248\u672c\u4e2d\u7684Blink\u5e03\u5c40\u5b58\u5728\u7c7b\u578b\u6df7\u6dc6\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7cbe\u5fc3\u5236\u4f5c\u7684HTML\u9875\u9762\u6f5c\u5728\u5730\u5229\u7528\u5806\u635f\u574f\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-92834",
"openTime": "2021-12-01",
"patchDescription": "Chrome\u662f\u7531Google\u5f00\u53d1\u7684\u4e00\u6b3e\u8bbe\u8ba1\u7b80\u5355\u3001\u9ad8\u6548\u7684Web\u6d4f\u89c8\u5de5\u5177\u3002\r\n\r\nGoogle Chrome 93.0.4577.82\u4e4b\u524d\u7248\u672c\u4e2d\u7684Blink\u5e03\u5c40\u5b58\u5728\u7c7b\u578b\u6df7\u6dc6\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7cbe\u5fc3\u5236\u4f5c\u7684HTML\u9875\u9762\u6f5c\u5728\u5730\u5229\u7528\u5806\u635f\u574f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Chrome\u7c7b\u578b\u6df7\u6dc6\u6f0f\u6d1e\uff08CNVD-2021-92834\uff09\u7684\u8865\u4e01",
"products": {
"product": "Google Chrome \u003c93.0.4577.82"
},
"referenceLink": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"serverity": "\u4e2d",
"submitTime": "2021-09-14",
"title": "Google Chrome\u7c7b\u578b\u6df7\u6dc6\u6f0f\u6d1e\uff08CNVD-2021-92834\uff09"
}
FKIE_CVE-2021-30627
Vulnerability from fkie_nvd - Published: 2021-10-08 21:15 - Updated: 2024-11-21 06:04| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 35 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5BE60BD-114C-4278-9F01-065274D86699",
"versionEndExcluding": "93.0.4577.82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
},
{
"lang": "es",
"value": "Una confusi\u00f3n de tipo en el dise\u00f1o de Blink en Google Chrome versiones anteriores a 93.0.4577.82, permit\u00eda a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada"
}
],
"id": "CVE-2021-30627",
"lastModified": "2024-11-21T06:04:19.440",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-08T21:15:07.420",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1245786"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1245786"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-M7V7-JC6R-6FW4
Vulnerability from github – Published: 2022-05-24 19:17 – Updated: 2022-05-24 19:17Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
{
"affected": [],
"aliases": [
"CVE-2021-30627"
],
"database_specific": {
"cwe_ids": [
"CWE-843"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-10-08T21:15:00Z",
"severity": "HIGH"
},
"details": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GHSA-m7v7-jc6r-6fw4",
"modified": "2022-05-24T19:17:01Z",
"published": "2022-05-24T19:17:01Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30627"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"type": "WEB",
"url": "https://crbug.com/1245786"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2021-30627
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-30627",
"description": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2021-30627",
"references": [
"https://www.suse.com/security/cve/CVE-2021-30627.html",
"https://advisories.mageia.org/CVE-2021-30627.html",
"https://security.archlinux.org/CVE-2021-30627"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-30627"
],
"details": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2021-30627",
"modified": "2023-12-13T01:23:31.961192Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2021-30627",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "93.0.4577.82"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Type Confusion"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1245786",
"refsource": "MISC",
"url": "https://crbug.com/1245786"
},
{
"name": "FEDORA-2021-ab09a05562",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "93.0.4577.82",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2021-30627"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://crbug.com/1245786",
"refsource": "MISC",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1245786"
},
{
"name": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"name": "FEDORA-2021-ab09a05562",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-11-23T22:03Z",
"publishedDate": "2021-10-08T21:15Z"
}
}
}
OPENSUSE-SU-2021:1300-1
Vulnerability from csaf_opensuse - Published: 2021-09-21 19:26 - Updated: 2021-09-21 19:26| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium 93.0.4577.63 (boo#1190096):\n\n* CVE-2021-30606: Use after free in Blink\n* CVE-2021-30607: Use after free in Permissions\n* CVE-2021-30608: Use after free in Web Share\n* CVE-2021-30609: Use after free in Sign-In\n* CVE-2021-30610: Use after free in Extensions API\n* CVE-2021-30611: Use after free in WebRTC\n* CVE-2021-30612: Use after free in WebRTC\n* CVE-2021-30613: Use after free in Base internals\n* CVE-2021-30614: Heap buffer overflow in TabStrip\n* CVE-2021-30615: Cross-origin data leak in Navigation\n* CVE-2021-30616: Use after free in Media\n* CVE-2021-30617: Policy bypass in Blink\n* CVE-2021-30618: Inappropriate implementation in DevTools\n* CVE-2021-30619: UI Spoofing in Autofill\n* CVE-2021-30620: Insufficient policy enforcement in Blink\n* CVE-2021-30621: UI Spoofing in Autofill\n* CVE-2021-30622: Use after free in WebApp Installs\n* CVE-2021-30623: Use after free in Bookmarks\n* CVE-2021-30624: Use after free in Autofill\n\nChromium 93.0.4577.82 (boo#1190476):\n\n* CVE-2021-30625: Use after free in Selection API\n* CVE-2021-30626: Out of bounds memory access in ANGLE\n* CVE-2021-30627: Type Confusion in Blink layout\n* CVE-2021-30628: Stack buffer overflow in ANGLE\n* CVE-2021-30629: Use after free in Permissions\n* CVE-2021-30630: Inappropriate implementation in Blink\n* CVE-2021-30631: Type Confusion in Blink layout\n* CVE-2021-30632: Out of bounds write in V8\n* CVE-2021-30633: Use after free in Indexed DB API\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1300",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1300-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1300-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1300-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/"
},
{
"category": "self",
"summary": "SUSE Bug 1190096",
"url": "https://bugzilla.suse.com/1190096"
},
{
"category": "self",
"summary": "SUSE Bug 1190476",
"url": "https://bugzilla.suse.com/1190476"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30607 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30608 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30610 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30611 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30613 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30614 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30614/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30615 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30616 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30617 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30618 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30619 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30620 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30621 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30622 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30623 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30625 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30626 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30626/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30627 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30628 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30629 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30630 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30631 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30632 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30632/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30633 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30633/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2021-09-21T19:26:47Z",
"generator": {
"date": "2021-09-21T19:26:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1300-1",
"initial_release_date": "2021-09-21T19:26:47Z",
"revision_history": [
{
"date": "2021-09-21T19:26:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"product": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"product_id": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"product": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"product_id": "chromium-93.0.4577.82-bp153.2.28.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"product": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"product_id": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"product": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"product_id": "chromium-93.0.4577.82-bp153.2.28.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP3",
"product": {
"name": "SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30606"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30606 Use after free in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30606",
"url": "https://www.suse.com/security/cve/CVE-2021-30606"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30606",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30606"
},
{
"cve": "CVE-2021-30607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30607"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30607 Use after free in Permissions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30607",
"url": "https://www.suse.com/security/cve/CVE-2021-30607"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30607",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30607"
},
{
"cve": "CVE-2021-30608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30608"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30608 Use after free in Web Share",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30608",
"url": "https://www.suse.com/security/cve/CVE-2021-30608"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30608",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30608"
},
{
"cve": "CVE-2021-30609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30609"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30609 Use after free in Sign-In",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30609",
"url": "https://www.suse.com/security/cve/CVE-2021-30609"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30609",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30609"
},
{
"cve": "CVE-2021-30610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30610"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30610 Use after free in Extensions API",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30610",
"url": "https://www.suse.com/security/cve/CVE-2021-30610"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30610",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30610"
},
{
"cve": "CVE-2021-30611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30611"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30611 Use after free in WebRTC",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30611",
"url": "https://www.suse.com/security/cve/CVE-2021-30611"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30611",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30611"
},
{
"cve": "CVE-2021-30612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30612"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30612 Use after free in WebRTC",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30612",
"url": "https://www.suse.com/security/cve/CVE-2021-30612"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30612",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30612"
},
{
"cve": "CVE-2021-30613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30613"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30613 Use after free in Base internals",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30613",
"url": "https://www.suse.com/security/cve/CVE-2021-30613"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30613",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30613"
},
{
"cve": "CVE-2021-30614",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30614"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30614",
"url": "https://www.suse.com/security/cve/CVE-2021-30614"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30614",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30614"
},
{
"cve": "CVE-2021-30615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30615"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30615 Cross-origin data leak in Navigation",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30615",
"url": "https://www.suse.com/security/cve/CVE-2021-30615"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30615",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30615"
},
{
"cve": "CVE-2021-30616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30616"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30616 Use after free in Media",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30616",
"url": "https://www.suse.com/security/cve/CVE-2021-30616"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30616",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30616"
},
{
"cve": "CVE-2021-30617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30617"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30617 Policy bypass in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30617",
"url": "https://www.suse.com/security/cve/CVE-2021-30617"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30617",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30617"
},
{
"cve": "CVE-2021-30618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30618"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30618 Inappropriate implementation in DevTools",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30618",
"url": "https://www.suse.com/security/cve/CVE-2021-30618"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30618",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30618"
},
{
"cve": "CVE-2021-30619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30619"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30619 UI Spoofing in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30619",
"url": "https://www.suse.com/security/cve/CVE-2021-30619"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30619",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30619"
},
{
"cve": "CVE-2021-30620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30620"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30620",
"url": "https://www.suse.com/security/cve/CVE-2021-30620"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30620",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30620"
},
{
"cve": "CVE-2021-30621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30621"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30621 UI Spoofing in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30621",
"url": "https://www.suse.com/security/cve/CVE-2021-30621"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30621",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30621"
},
{
"cve": "CVE-2021-30622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30622"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30622 Use after free in WebApp Installs",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30622",
"url": "https://www.suse.com/security/cve/CVE-2021-30622"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30622",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30622"
},
{
"cve": "CVE-2021-30623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30623"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30623 Use after free in Bookmarks",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30623",
"url": "https://www.suse.com/security/cve/CVE-2021-30623"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30623",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30623"
},
{
"cve": "CVE-2021-30624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30624"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30624 Use after free in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30624",
"url": "https://www.suse.com/security/cve/CVE-2021-30624"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30624",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30624"
},
{
"cve": "CVE-2021-30625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30625"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30625",
"url": "https://www.suse.com/security/cve/CVE-2021-30625"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30625",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30625"
},
{
"cve": "CVE-2021-30626",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30626"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30626",
"url": "https://www.suse.com/security/cve/CVE-2021-30626"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30626",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30626"
},
{
"cve": "CVE-2021-30627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30627"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30627",
"url": "https://www.suse.com/security/cve/CVE-2021-30627"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30627",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30627"
},
{
"cve": "CVE-2021-30628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30628"
}
],
"notes": [
{
"category": "general",
"text": "Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30628",
"url": "https://www.suse.com/security/cve/CVE-2021-30628"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30628",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30628"
},
{
"cve": "CVE-2021-30629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30629"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30629",
"url": "https://www.suse.com/security/cve/CVE-2021-30629"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30629",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30629"
},
{
"cve": "CVE-2021-30630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30630"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30630",
"url": "https://www.suse.com/security/cve/CVE-2021-30630"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30630",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30630"
},
{
"cve": "CVE-2021-30631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30631"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30631",
"url": "https://www.suse.com/security/cve/CVE-2021-30631"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30631",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30631"
},
{
"cve": "CVE-2021-30632",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30632"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30632",
"url": "https://www.suse.com/security/cve/CVE-2021-30632"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30632",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30632"
},
{
"cve": "CVE-2021-30633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30633"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30633",
"url": "https://www.suse.com/security/cve/CVE-2021-30633"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30633",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30633"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.