opensuse-su-2021:1131-1
Vulnerability from csaf_opensuse
Published
2021-08-10 10:23
Modified
2021-08-10 10:23
Summary
Security update for chromium
Notes
Title of the patch
Security update for chromium
Description of the patch
This update for chromium fixes the following issues:
Chromium 92.0.4515.131 (boo#1189006)
* CVE-2021-30590: Heap buffer overflow in Bookmarks
* CVE-2021-30591: Use after free in File System API
* CVE-2021-30592: Out of bounds write in Tab Groups
* CVE-2021-30593: Out of bounds read in Tab Strip
* CVE-2021-30594: Use after free in Page Info UI
* CVE-2021-30596: Incorrect security UI in Navigation
* CVE-2021-30597: Use after free in Browser UI
Chromium 92.0.4515.107 (boo#1188590)
* CVE-2021-30565: Out of bounds write in Tab Groups
* CVE-2021-30566: Stack buffer overflow in Printing
* CVE-2021-30567: Use after free in DevTools
* CVE-2021-30568: Heap buffer overflow in WebGL
* CVE-2021-30569: Use after free in sqlite
* CVE-2021-30571: Insufficient policy enforcement in DevTools
* CVE-2021-30572: Use after free in Autofill
* CVE-2021-30573: Use after free in GPU
* CVE-2021-30574: Use after free in protocol handling
* CVE-2021-30575: Out of bounds read in Autofill
* CVE-2021-30576: Use after free in DevTools
* CVE-2021-30577: Insufficient policy enforcement in Installer
* CVE-2021-30578: Uninitialized Use in Media
* CVE-2021-30579: Use after free in UI framework
* CVE-2021-30581: Use after free in DevTools
* CVE-2021-30582: Inappropriate implementation in Animation
* CVE-2021-30584: Incorrect security UI in Downloads
* CVE-2021-30585: Use after free in sensor handling
* CVE-2021-30588: Type Confusion in V8
* CVE-2021-30589: Insufficient validation of untrusted input in Sharing
Patchnames
openSUSE-2021-1131
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium 92.0.4515.131 (boo#1189006)\n\n* CVE-2021-30590: Heap buffer overflow in Bookmarks\n* CVE-2021-30591: Use after free in File System API\n* CVE-2021-30592: Out of bounds write in Tab Groups\n* CVE-2021-30593: Out of bounds read in Tab Strip\n* CVE-2021-30594: Use after free in Page Info UI\n* CVE-2021-30596: Incorrect security UI in Navigation\n* CVE-2021-30597: Use after free in Browser UI\n\nChromium 92.0.4515.107 (boo#1188590)\n\n* CVE-2021-30565: Out of bounds write in Tab Groups\n* CVE-2021-30566: Stack buffer overflow in Printing\n* CVE-2021-30567: Use after free in DevTools\n* CVE-2021-30568: Heap buffer overflow in WebGL\n* CVE-2021-30569: Use after free in sqlite\n* CVE-2021-30571: Insufficient policy enforcement in DevTools\n* CVE-2021-30572: Use after free in Autofill\n* CVE-2021-30573: Use after free in GPU\n* CVE-2021-30574: Use after free in protocol handling\n* CVE-2021-30575: Out of bounds read in Autofill\n* CVE-2021-30576: Use after free in DevTools\n* CVE-2021-30577: Insufficient policy enforcement in Installer\n* CVE-2021-30578: Uninitialized Use in Media\n* CVE-2021-30579: Use after free in UI framework\n* CVE-2021-30581: Use after free in DevTools\n* CVE-2021-30582: Inappropriate implementation in Animation\n* CVE-2021-30584: Incorrect security UI in Downloads\n* CVE-2021-30585: Use after free in sensor handling\n* CVE-2021-30588: Type Confusion in V8\n* CVE-2021-30589: Insufficient validation of untrusted input in Sharing\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1131",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1131-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1131-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1131-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTT3WQIVTBT7PZKT6YDJXEYNVRRJDO2/"
},
{
"category": "self",
"summary": "SUSE Bug 1188590",
"url": "https://bugzilla.suse.com/1188590"
},
{
"category": "self",
"summary": "SUSE Bug 1189006",
"url": "https://bugzilla.suse.com/1189006"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30565 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30566 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30567 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30568 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30568/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30569 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30571 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30572 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30572/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30573 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30573/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30574 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30574/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30575 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30575/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30577 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30578 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30579 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30581 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30582 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30584 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30584/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30585 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30585/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30588 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30589 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30590 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30591 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30592 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30593 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30594 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30596 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30597 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30597/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2021-08-10T10:23:44Z",
"generator": {
"date": "2021-08-10T10:23:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1131-1",
"initial_release_date": "2021-08-10T10:23:44Z",
"revision_history": [
{
"date": "2021-08-10T10:23:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"product": {
"name": "chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"product_id": "chromedriver-92.0.4515.131-lp152.2.116.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-92.0.4515.131-lp152.2.116.1.x86_64",
"product": {
"name": "chromium-92.0.4515.131-lp152.2.116.1.x86_64",
"product_id": "chromium-92.0.4515.131-lp152.2.116.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-92.0.4515.131-lp152.2.116.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64"
},
"product_reference": "chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-92.0.4515.131-lp152.2.116.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
},
"product_reference": "chromium-92.0.4515.131-lp152.2.116.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30565"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in Tab Groups in Google Chrome on Linux and ChromeOS prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30565",
"url": "https://www.suse.com/security/cve/CVE-2021-30565"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30565"
},
{
"cve": "CVE-2021-30566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30566"
}
],
"notes": [
{
"category": "general",
"text": "Stack buffer overflow in Printing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit stack corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30566",
"url": "https://www.suse.com/security/cve/CVE-2021-30566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30566"
},
{
"cve": "CVE-2021-30567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30567"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to open DevTools to potentially exploit heap corruption via specific user gesture.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30567",
"url": "https://www.suse.com/security/cve/CVE-2021-30567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30567"
},
{
"cve": "CVE-2021-30568",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30568"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in WebGL in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30568",
"url": "https://www.suse.com/security/cve/CVE-2021-30568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30568"
},
{
"cve": "CVE-2021-30569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30569"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30569",
"url": "https://www.suse.com/security/cve/CVE-2021-30569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30569"
},
{
"cve": "CVE-2021-30571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30571"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30571",
"url": "https://www.suse.com/security/cve/CVE-2021-30571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30571"
},
{
"cve": "CVE-2021-30572",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30572"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30572",
"url": "https://www.suse.com/security/cve/CVE-2021-30572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30572"
},
{
"cve": "CVE-2021-30573",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30573"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30573",
"url": "https://www.suse.com/security/cve/CVE-2021-30573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30573"
},
{
"cve": "CVE-2021-30574",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30574"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in protocol handling in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30574",
"url": "https://www.suse.com/security/cve/CVE-2021-30574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30574"
},
{
"cve": "CVE-2021-30575",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30575"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30575",
"url": "https://www.suse.com/security/cve/CVE-2021-30575"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30575"
},
{
"cve": "CVE-2021-30576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30576"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30576",
"url": "https://www.suse.com/security/cve/CVE-2021-30576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30576"
},
{
"cve": "CVE-2021-30577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30577"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Installer in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform local privilege escalation via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30577",
"url": "https://www.suse.com/security/cve/CVE-2021-30577"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30577"
},
{
"cve": "CVE-2021-30578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30578"
}
],
"notes": [
{
"category": "general",
"text": "Uninitialized use in Media in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30578",
"url": "https://www.suse.com/security/cve/CVE-2021-30578"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30578"
},
{
"cve": "CVE-2021-30579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30579"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in UI framework in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30579",
"url": "https://www.suse.com/security/cve/CVE-2021-30579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30579"
},
{
"cve": "CVE-2021-30581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30581"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30581",
"url": "https://www.suse.com/security/cve/CVE-2021-30581"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30581"
},
{
"cve": "CVE-2021-30582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30582"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Animation in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30582",
"url": "https://www.suse.com/security/cve/CVE-2021-30582"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30582"
},
{
"cve": "CVE-2021-30584",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30584"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Downloads in Google Chrome on Android prior to 92.0.4515.107 allowed a remote attacker to perform domain spoofing via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30584",
"url": "https://www.suse.com/security/cve/CVE-2021-30584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30584"
},
{
"cve": "CVE-2021-30585",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30585"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in sensor handling in Google Chrome on Windows prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30585",
"url": "https://www.suse.com/security/cve/CVE-2021-30585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30585"
},
{
"cve": "CVE-2021-30588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30588"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30588",
"url": "https://www.suse.com/security/cve/CVE-2021-30588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "low"
}
],
"title": "CVE-2021-30588"
},
{
"cve": "CVE-2021-30589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30589"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Sharing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to bypass navigation restrictions via a crafted click-to-call link.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30589",
"url": "https://www.suse.com/security/cve/CVE-2021-30589"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30589"
},
{
"cve": "CVE-2021-30590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30590"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30590",
"url": "https://www.suse.com/security/cve/CVE-2021-30590"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30590",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30590"
},
{
"cve": "CVE-2021-30591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30591"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in File System API in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30591",
"url": "https://www.suse.com/security/cve/CVE-2021-30591"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30591",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30591"
},
{
"cve": "CVE-2021-30592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30592"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in Tab Groups in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30592",
"url": "https://www.suse.com/security/cve/CVE-2021-30592"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30592",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30592"
},
{
"cve": "CVE-2021-30593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30593"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Tab Strip in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30593",
"url": "https://www.suse.com/security/cve/CVE-2021-30593"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30593",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30593"
},
{
"cve": "CVE-2021-30594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30594"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Page Info UI in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30594",
"url": "https://www.suse.com/security/cve/CVE-2021-30594"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30594",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30594"
},
{
"cve": "CVE-2021-30596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30596"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Navigation in Google Chrome on Android prior to 92.0.4515.131 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30596",
"url": "https://www.suse.com/security/cve/CVE-2021-30596"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30596",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30596"
},
{
"cve": "CVE-2021-30597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30597"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Browser UI in Google Chrome on Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30597",
"url": "https://www.suse.com/security/cve/CVE-2021-30597"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30597",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:chromedriver-92.0.4515.131-lp152.2.116.1.x86_64",
"openSUSE Leap 15.2:chromium-92.0.4515.131-lp152.2.116.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-10T10:23:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-30597"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…