Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-30632 (GCVE-0-2021-30632)
Vulnerability from cvelistv5 – Published: 2021-10-08 00:00 – Updated: 2025-10-21 23:25- Out of bounds write
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-122 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Chromium V8 |
| Due Date | 2021-11-17 |
| Date Added | 2021-11-03 |
| Vendorproject | |
| Vulnerabilityname | Google Chromium V8 Out-of-Bounds Write Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:40:31.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://crbug.com/1247763"
},
{
"name": "FEDORA-2021-ab09a05562",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
},
{
"tags": [
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2021-30632",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-29T16:52:08.650470Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2021-11-03",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30632"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:25:29.990Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30632"
}
],
"timeline": [
{
"lang": "en",
"time": "2021-11-03T00:00:00.000Z",
"value": "CVE-2021-30632 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "93.0.4577.82",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out of bounds write",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-12T00:00:00.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"url": "https://crbug.com/1247763"
},
{
"name": "FEDORA-2021-ab09a05562",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
},
{
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2021-30632",
"datePublished": "2021-10-08T00:00:00.000Z",
"dateReserved": "2021-04-13T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:25:29.990Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2021-30632",
"cwes": "[\"CWE-122\"]",
"dateAdded": "2021-11-03",
"dueDate": "2021-11-17",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2021-30632",
"product": "Chromium V8",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Google Chromium V8 Engine contains an out-of-bounds write vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.",
"vendorProject": "Google",
"vulnerabilityName": "Google Chromium V8 Out-of-Bounds Write Vulnerability"
},
"epss": {
"cve": "CVE-2021-30632",
"date": "2026-05-20",
"epss": "0.84484",
"percentile": "0.99341"
},
"fkie_nvd": {
"cisaActionDue": "2021-11-17",
"cisaExploitAdd": "2021-11-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Google Chromium V8 Out-of-Bounds Write Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"93.0.4577.82\", \"matchCriteriaId\": \"B5BE60BD-114C-4278-9F01-065274D86699\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"}, {\"lang\": \"es\", \"value\": \"Una escritura fuera de l\\u00edmites en V8 en Google Chrome versiones anteriores a 93.0.4577.82, permit\\u00eda a un atacante remoto explotar potencialmente una corrupci\\u00f3n de la pila por medio de una p\\u00e1gina HTML dise\\u00f1ada\"}]",
"id": "CVE-2021-30632",
"lastModified": "2024-11-21T06:04:19.917",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-10-08T21:15:07.603",
"references": "[{\"url\": \"http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://crbug.com/1247763\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://crbug.com/1247763\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-30632\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2021-10-08T21:15:07.603\",\"lastModified\":\"2025-10-24T21:08:18.403\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Una escritura fuera de l\u00edmites en V8 en Google Chrome versiones anteriores a 93.0.4577.82, permit\u00eda a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"cisaExploitAdd\":\"2021-11-03\",\"cisaActionDue\":\"2021-11-17\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Google Chromium V8 Out-of-Bounds Write Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"93.0.4577.82\",\"matchCriteriaId\":\"B5BE60BD-114C-4278-9F01-065274D86699\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://crbug.com/1247763\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://crbug.com/1247763\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30632\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://crbug.com/1247763\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"name\": \"FEDORA-2021-ab09a05562\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"name\": \"FEDORA-2021-591b3a2af0\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T22:40:31.947Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-30632\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-29T16:52:08.650470Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2021-11-03\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30632\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2021-11-03T00:00:00.000Z\", \"value\": \"CVE-2021-30632 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30632\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-29T16:51:08.607Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Google\", \"product\": \"Chrome\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"93.0.4577.82\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\"}, {\"url\": \"https://crbug.com/1247763\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"name\": \"FEDORA-2021-ab09a05562\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"name\": \"FEDORA-2021-591b3a2af0\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Out of bounds write\"}]}], \"providerMetadata\": {\"orgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"shortName\": \"Chrome\", \"dateUpdated\": \"2023-06-12T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-30632\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:25:29.990Z\", \"dateReserved\": \"2021-04-13T00:00:00.000Z\", \"assignerOrgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"datePublished\": \"2021-10-08T00:00:00.000Z\", \"assignerShortName\": \"Chrome\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2021-AVI-701
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 93.0.4577.82",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30632"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 13 septembre 2021",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2021-AVI-708
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Edge. Elles permettent à un attaquant de provoquer une usurpation d'identité, une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la fonctionnalité de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge pour Android",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Edge (Chromium-based)",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-26439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26439"
},
{
"name": "CVE-2021-30612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30612"
},
{
"name": "CVE-2021-30616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30616"
},
{
"name": "CVE-2021-30621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30621"
},
{
"name": "CVE-2021-30603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30603"
},
{
"name": "CVE-2021-30617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30617"
},
{
"name": "CVE-2021-30613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30613"
},
{
"name": "CVE-2021-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30601"
},
{
"name": "CVE-2021-30611",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30611"
},
{
"name": "CVE-2021-30618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30618"
},
{
"name": "CVE-2021-30606",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30606"
},
{
"name": "CVE-2021-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38669"
},
{
"name": "CVE-2021-30610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30610"
},
{
"name": "CVE-2021-30620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30620"
},
{
"name": "CVE-2021-30607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30607"
},
{
"name": "CVE-2021-30598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30598"
},
{
"name": "CVE-2021-30602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30602"
},
{
"name": "CVE-2021-30608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30608"
},
{
"name": "CVE-2021-30599",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30599"
},
{
"name": "CVE-2021-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30632"
},
{
"name": "CVE-2021-30614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30614"
},
{
"name": "CVE-2021-30604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30604"
},
{
"name": "CVE-2021-30623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30623"
},
{
"name": "CVE-2021-30622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30622"
},
{
"name": "CVE-2021-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36930"
},
{
"name": "CVE-2021-30609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30609"
},
{
"name": "CVE-2021-26436",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26436"
},
{
"name": "CVE-2021-30624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30624"
},
{
"name": "CVE-2021-30619",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30619"
},
{
"name": "CVE-2021-38642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38642"
},
{
"name": "CVE-2021-38641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38641"
},
{
"name": "CVE-2021-30615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30615"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-708",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Edge\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une usurpation d\u0027identit\u00e9, une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la\nfonctionnalit\u00e9 de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 14 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2021-AVI-701
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 93.0.4577.82",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30632"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 13 septembre 2021",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2021-AVI-708
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Edge. Elles permettent à un attaquant de provoquer une usurpation d'identité, une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la fonctionnalité de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge pour Android",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Edge (Chromium-based)",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-26439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26439"
},
{
"name": "CVE-2021-30612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30612"
},
{
"name": "CVE-2021-30616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30616"
},
{
"name": "CVE-2021-30621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30621"
},
{
"name": "CVE-2021-30603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30603"
},
{
"name": "CVE-2021-30617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30617"
},
{
"name": "CVE-2021-30613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30613"
},
{
"name": "CVE-2021-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30601"
},
{
"name": "CVE-2021-30611",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30611"
},
{
"name": "CVE-2021-30618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30618"
},
{
"name": "CVE-2021-30606",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30606"
},
{
"name": "CVE-2021-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38669"
},
{
"name": "CVE-2021-30610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30610"
},
{
"name": "CVE-2021-30620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30620"
},
{
"name": "CVE-2021-30607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30607"
},
{
"name": "CVE-2021-30598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30598"
},
{
"name": "CVE-2021-30602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30602"
},
{
"name": "CVE-2021-30608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30608"
},
{
"name": "CVE-2021-30599",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30599"
},
{
"name": "CVE-2021-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30632"
},
{
"name": "CVE-2021-30614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30614"
},
{
"name": "CVE-2021-30604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30604"
},
{
"name": "CVE-2021-30623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30623"
},
{
"name": "CVE-2021-30622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30622"
},
{
"name": "CVE-2021-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36930"
},
{
"name": "CVE-2021-30609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30609"
},
{
"name": "CVE-2021-26436",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26436"
},
{
"name": "CVE-2021-30624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30624"
},
{
"name": "CVE-2021-30619",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30619"
},
{
"name": "CVE-2021-38642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38642"
},
{
"name": "CVE-2021-38641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38641"
},
{
"name": "CVE-2021-30615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30615"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-708",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Edge\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une usurpation d\u0027identit\u00e9, une \u00e9l\u00e9vation de privil\u00e8ges, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la\nfonctionnalit\u00e9 de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 14 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
BDU:2021-04793
Vulnerability from fstec - Published: 08.09.2021{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Google Inc, Microsoft Corp, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), \u0434\u043e 93.0.4577.82 (Google Chrome), \u0434\u043e 93.0.961.52 (Microsoft Edge), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.3 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Google Chrome:\nhttps://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\n\n\u0414\u043b\u044f Microsoft Edge:\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-30632\n\n\u0414\u043b\u044f Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2021-1126SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0114SE47\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 94.0.4606.81+repack-1osnova1.1\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.09.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.09.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-04793",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-30632",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Google Chrome, Microsoft Edge, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430 JavaScript-\u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0435\u0432 V8 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u044b\u0445\u043e\u0434 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-119), \u0417\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-787)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430 JavaScript-\u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0435\u0432 V8 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-30632\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2021-1126SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0114SE47\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.3/\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-119, CWE-787",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2021-73432
Vulnerability from cnvd - Published: 2021-09-26厂商已发布了漏洞修复程序,请及时关注更新: https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
| Name | Google Chrome <93.0.4577.82 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-30632",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-30632"
}
},
"description": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002\n\nGoogle Chrome V8\u5b58\u5728\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\u60c5\u51b5\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-73432",
"openTime": "2021-09-26",
"patchDescription": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002\r\n\r\nGoogle Chrome V8\u5b58\u5728\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\u60c5\u51b5\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Chrome V8\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2021-73432\uff09\u7684\u8865\u4e01",
"products": {
"product": "Google Chrome \u003c93.0.4577.82"
},
"referenceLink": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"serverity": "\u9ad8",
"submitTime": "2021-09-14",
"title": "Google Chrome V8\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2021-73432\uff09"
}
FKIE_CVE-2021-30632
Vulnerability from fkie_nvd - Published: 2021-10-08 21:15 - Updated: 2025-10-24 21:088.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 35 |
{
"cisaActionDue": "2021-11-17",
"cisaExploitAdd": "2021-11-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Google Chromium V8 Out-of-Bounds Write Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5BE60BD-114C-4278-9F01-065274D86699",
"versionEndExcluding": "93.0.4577.82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
},
{
"lang": "es",
"value": "Una escritura fuera de l\u00edmites en V8 en Google Chrome versiones anteriores a 93.0.4577.82, permit\u00eda a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada"
}
],
"id": "CVE-2021-30632",
"lastModified": "2025-10-24T21:08:18.403",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2021-10-08T21:15:07.603",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required"
],
"url": "https://crbug.com/1247763"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://crbug.com/1247763"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30632"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-38C8-MW66-J237
Vulnerability from github – Published: 2022-05-24 19:17 – Updated: 2025-10-22 00:32Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
{
"affected": [],
"aliases": [
"CVE-2021-30632"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-10-08T21:15:00Z",
"severity": "HIGH"
},
"details": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GHSA-38c8-mw66-j237",
"modified": "2025-10-22T00:32:25Z",
"published": "2022-05-24T19:17:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30632"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"type": "WEB",
"url": "https://crbug.com/1247763"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30632"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2021-30632
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-30632",
"description": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2021-30632",
"references": [
"https://www.suse.com/security/cve/CVE-2021-30632.html",
"https://security.archlinux.org/CVE-2021-30632"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-30632"
],
"details": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2021-30632",
"modified": "2023-12-13T01:23:30.717803Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cisa.gov": {
"cveID": "CVE-2021-30632",
"dateAdded": "2021-11-03",
"dueDate": "2021-11-17",
"product": "Chrome",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Google Chrome out-of-bounds write that allows to execute arbitrary code on the target system.",
"vendorProject": "Google",
"vulnerabilityName": "Google Chrome Out-of-bounds write"
},
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2021-30632",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "93.0.4577.82"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out of bounds write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1247763",
"refsource": "MISC",
"url": "https://crbug.com/1247763"
},
{
"name": "FEDORA-2021-ab09a05562",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
},
{
"name": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "93.0.4577.82",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2021-30632"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://crbug.com/1247763",
"refsource": "MISC",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1247763"
},
{
"name": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"name": "FEDORA-2021-ab09a05562",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
},
{
"name": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html",
"refsource": "MISC",
"tags": [],
"url": "http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-06-12T07:15Z",
"publishedDate": "2021-10-08T21:15Z"
}
}
}
OPENSUSE-SU-2021:1300-1
Vulnerability from csaf_opensuse - Published: 2021-09-21 19:26 - Updated: 2021-09-21 19:26| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium 93.0.4577.63 (boo#1190096):\n\n* CVE-2021-30606: Use after free in Blink\n* CVE-2021-30607: Use after free in Permissions\n* CVE-2021-30608: Use after free in Web Share\n* CVE-2021-30609: Use after free in Sign-In\n* CVE-2021-30610: Use after free in Extensions API\n* CVE-2021-30611: Use after free in WebRTC\n* CVE-2021-30612: Use after free in WebRTC\n* CVE-2021-30613: Use after free in Base internals\n* CVE-2021-30614: Heap buffer overflow in TabStrip\n* CVE-2021-30615: Cross-origin data leak in Navigation\n* CVE-2021-30616: Use after free in Media\n* CVE-2021-30617: Policy bypass in Blink\n* CVE-2021-30618: Inappropriate implementation in DevTools\n* CVE-2021-30619: UI Spoofing in Autofill\n* CVE-2021-30620: Insufficient policy enforcement in Blink\n* CVE-2021-30621: UI Spoofing in Autofill\n* CVE-2021-30622: Use after free in WebApp Installs\n* CVE-2021-30623: Use after free in Bookmarks\n* CVE-2021-30624: Use after free in Autofill\n\nChromium 93.0.4577.82 (boo#1190476):\n\n* CVE-2021-30625: Use after free in Selection API\n* CVE-2021-30626: Out of bounds memory access in ANGLE\n* CVE-2021-30627: Type Confusion in Blink layout\n* CVE-2021-30628: Stack buffer overflow in ANGLE\n* CVE-2021-30629: Use after free in Permissions\n* CVE-2021-30630: Inappropriate implementation in Blink\n* CVE-2021-30631: Type Confusion in Blink layout\n* CVE-2021-30632: Out of bounds write in V8\n* CVE-2021-30633: Use after free in Indexed DB API\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1300",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1300-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1300-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1300-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/"
},
{
"category": "self",
"summary": "SUSE Bug 1190096",
"url": "https://bugzilla.suse.com/1190096"
},
{
"category": "self",
"summary": "SUSE Bug 1190476",
"url": "https://bugzilla.suse.com/1190476"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30607 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30608 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30610 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30611 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30613 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30614 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30614/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30615 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30616 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30617 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30618 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30619 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30620 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30621 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30622 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30623 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30625 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30626 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30626/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30627 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30628 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30629 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30630 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30631 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30632 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30632/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30633 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30633/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2021-09-21T19:26:47Z",
"generator": {
"date": "2021-09-21T19:26:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1300-1",
"initial_release_date": "2021-09-21T19:26:47Z",
"revision_history": [
{
"date": "2021-09-21T19:26:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"product": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"product_id": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"product": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"product_id": "chromium-93.0.4577.82-bp153.2.28.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"product": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"product_id": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"product": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"product_id": "chromium-93.0.4577.82-bp153.2.28.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP3",
"product": {
"name": "SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30606"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30606 Use after free in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30606",
"url": "https://www.suse.com/security/cve/CVE-2021-30606"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30606",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30606"
},
{
"cve": "CVE-2021-30607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30607"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30607 Use after free in Permissions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30607",
"url": "https://www.suse.com/security/cve/CVE-2021-30607"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30607",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30607"
},
{
"cve": "CVE-2021-30608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30608"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30608 Use after free in Web Share",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30608",
"url": "https://www.suse.com/security/cve/CVE-2021-30608"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30608",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30608"
},
{
"cve": "CVE-2021-30609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30609"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30609 Use after free in Sign-In",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30609",
"url": "https://www.suse.com/security/cve/CVE-2021-30609"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30609",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30609"
},
{
"cve": "CVE-2021-30610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30610"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30610 Use after free in Extensions API",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30610",
"url": "https://www.suse.com/security/cve/CVE-2021-30610"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30610",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30610"
},
{
"cve": "CVE-2021-30611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30611"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30611 Use after free in WebRTC",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30611",
"url": "https://www.suse.com/security/cve/CVE-2021-30611"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30611",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30611"
},
{
"cve": "CVE-2021-30612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30612"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30612 Use after free in WebRTC",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30612",
"url": "https://www.suse.com/security/cve/CVE-2021-30612"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30612",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30612"
},
{
"cve": "CVE-2021-30613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30613"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30613 Use after free in Base internals",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30613",
"url": "https://www.suse.com/security/cve/CVE-2021-30613"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30613",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30613"
},
{
"cve": "CVE-2021-30614",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30614"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30614",
"url": "https://www.suse.com/security/cve/CVE-2021-30614"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30614",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30614"
},
{
"cve": "CVE-2021-30615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30615"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30615 Cross-origin data leak in Navigation",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30615",
"url": "https://www.suse.com/security/cve/CVE-2021-30615"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30615",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30615"
},
{
"cve": "CVE-2021-30616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30616"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30616 Use after free in Media",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30616",
"url": "https://www.suse.com/security/cve/CVE-2021-30616"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30616",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30616"
},
{
"cve": "CVE-2021-30617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30617"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30617 Policy bypass in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30617",
"url": "https://www.suse.com/security/cve/CVE-2021-30617"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30617",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30617"
},
{
"cve": "CVE-2021-30618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30618"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30618 Inappropriate implementation in DevTools",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30618",
"url": "https://www.suse.com/security/cve/CVE-2021-30618"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30618",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30618"
},
{
"cve": "CVE-2021-30619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30619"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30619 UI Spoofing in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30619",
"url": "https://www.suse.com/security/cve/CVE-2021-30619"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30619",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30619"
},
{
"cve": "CVE-2021-30620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30620"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30620",
"url": "https://www.suse.com/security/cve/CVE-2021-30620"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30620",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30620"
},
{
"cve": "CVE-2021-30621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30621"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30621 UI Spoofing in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30621",
"url": "https://www.suse.com/security/cve/CVE-2021-30621"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30621",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30621"
},
{
"cve": "CVE-2021-30622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30622"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30622 Use after free in WebApp Installs",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30622",
"url": "https://www.suse.com/security/cve/CVE-2021-30622"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30622",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30622"
},
{
"cve": "CVE-2021-30623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30623"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30623 Use after free in Bookmarks",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30623",
"url": "https://www.suse.com/security/cve/CVE-2021-30623"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30623",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30623"
},
{
"cve": "CVE-2021-30624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30624"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30624 Use after free in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30624",
"url": "https://www.suse.com/security/cve/CVE-2021-30624"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30624",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30624"
},
{
"cve": "CVE-2021-30625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30625"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30625",
"url": "https://www.suse.com/security/cve/CVE-2021-30625"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30625",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30625"
},
{
"cve": "CVE-2021-30626",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30626"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30626",
"url": "https://www.suse.com/security/cve/CVE-2021-30626"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30626",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30626"
},
{
"cve": "CVE-2021-30627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30627"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30627",
"url": "https://www.suse.com/security/cve/CVE-2021-30627"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30627",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30627"
},
{
"cve": "CVE-2021-30628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30628"
}
],
"notes": [
{
"category": "general",
"text": "Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30628",
"url": "https://www.suse.com/security/cve/CVE-2021-30628"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30628",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30628"
},
{
"cve": "CVE-2021-30629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30629"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30629",
"url": "https://www.suse.com/security/cve/CVE-2021-30629"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30629",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30629"
},
{
"cve": "CVE-2021-30630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30630"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30630",
"url": "https://www.suse.com/security/cve/CVE-2021-30630"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30630",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30630"
},
{
"cve": "CVE-2021-30631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30631"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30631",
"url": "https://www.suse.com/security/cve/CVE-2021-30631"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30631",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30631"
},
{
"cve": "CVE-2021-30632",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30632"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30632",
"url": "https://www.suse.com/security/cve/CVE-2021-30632"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30632",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30632"
},
{
"cve": "CVE-2021-30633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30633"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30633",
"url": "https://www.suse.com/security/cve/CVE-2021-30633"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30633",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30633"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.