Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-30633 (GCVE-0-2021-30633)
Vulnerability from cvelistv5 – Published: 2021-10-08 20:50 – Updated: 2025-10-21 23:25- Use after free
| URL | Tags |
|---|---|
| https://chromereleases.googleblog.com/2021/09/sta… | x_refsource_MISC |
| https://crbug.com/1247766 | x_refsource_MISC |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-416 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Chromium Indexed DB API |
| Due Date | 2021-11-17 |
| Date Added | 2021-11-03 |
| Vendorproject | |
| Vulnerabilityname | Google Chromium Indexed DB API Use-After-Free Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:40:31.802Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://crbug.com/1247766"
},
{
"name": "FEDORA-2021-ab09a05562",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2021-30633",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-29T16:51:06.707078Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2021-11-03",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30633"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:25:29.633Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30633"
}
],
"timeline": [
{
"lang": "en",
"time": "2021-11-03T00:00:00.000Z",
"value": "CVE-2021-30633 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "93.0.4577.82",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use after free",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-30T01:09:29.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://crbug.com/1247766"
},
{
"name": "FEDORA-2021-ab09a05562",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2021-30633",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "93.0.4577.82"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1247766",
"refsource": "MISC",
"url": "https://crbug.com/1247766"
},
{
"name": "FEDORA-2021-ab09a05562",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2021-30633",
"datePublished": "2021-10-08T20:50:29.000Z",
"dateReserved": "2021-04-13T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:25:29.633Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2021-30633",
"cwes": "[\"CWE-416\"]",
"dateAdded": "2021-11-03",
"dueDate": "2021-11-17",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2021-30633",
"product": "Chromium Indexed DB API",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Google Chromium Indexed DB API contains a use-after-free vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.",
"vendorProject": "Google",
"vulnerabilityName": "Google Chromium Indexed DB API Use-After-Free Vulnerability"
},
"epss": {
"cve": "CVE-2021-30633",
"date": "2026-05-21",
"epss": "0.37899",
"percentile": "0.97268"
},
"fkie_nvd": {
"cisaActionDue": "2021-11-17",
"cisaExploitAdd": "2021-11-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Google Chromium Indexed DB API Use-After-Free Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"93.0.4577.82\", \"matchCriteriaId\": \"B5BE60BD-114C-4278-9F01-065274D86699\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\"}, {\"lang\": \"es\", \"value\": \"Un uso de memoria previamente liberada en la API de la base de datos Indexada en Google Chrome versiones anteriores a 93.0.4577.82, permit\\u00eda a un atacante remoto que hubiera comprometido el proceso del renderizador llevar a cabo potencialmente un escape de sandbox por medio de una p\\u00e1gina HTML dise\\u00f1ada\"}]",
"id": "CVE-2021-30633",
"lastModified": "2024-11-21T06:04:20.043",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 9.6, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-10-08T21:15:07.650",
"references": "[{\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://crbug.com/1247766\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://crbug.com/1247766\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-30633\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2021-10-08T21:15:07.650\",\"lastModified\":\"2025-10-24T21:08:14.887\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Un uso de memoria previamente liberada en la API de la base de datos Indexada en Google Chrome versiones anteriores a 93.0.4577.82, permit\u00eda a un atacante remoto que hubiera comprometido el proceso del renderizador llevar a cabo potencialmente un escape de sandbox por medio de una p\u00e1gina HTML dise\u00f1ada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"cisaExploitAdd\":\"2021-11-03\",\"cisaActionDue\":\"2021-11-17\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Google Chromium Indexed DB API Use-After-Free Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"93.0.4577.82\",\"matchCriteriaId\":\"B5BE60BD-114C-4278-9F01-065274D86699\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}],\"references\":[{\"url\":\"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://crbug.com/1247766\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://crbug.com/1247766\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30633\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://crbug.com/1247766\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"name\": \"FEDORA-2021-ab09a05562\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"name\": \"FEDORA-2021-591b3a2af0\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T22:40:31.802Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-30633\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-29T16:51:06.707078Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2021-11-03\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30633\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2021-11-03T00:00:00.000Z\", \"value\": \"CVE-2021-30633 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30633\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-29T16:50:10.009Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Google\", \"product\": \"Chrome\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"93.0.4577.82\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://crbug.com/1247766\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"name\": \"FEDORA-2021-ab09a05562\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"name\": \"FEDORA-2021-591b3a2af0\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Use after free\"}]}], \"providerMetadata\": {\"orgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"shortName\": \"Chrome\", \"dateUpdated\": \"2021-10-30T01:09:29.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"93.0.4577.82\", \"version_affected\": \"\u003c\"}]}, \"product_name\": \"Chrome\"}]}, \"vendor_name\": \"Google\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"name\": \"https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://crbug.com/1247766\", \"name\": \"https://crbug.com/1247766\", \"refsource\": \"MISC\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/\", \"name\": \"FEDORA-2021-ab09a05562\", \"refsource\": \"FEDORA\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/\", \"name\": \"FEDORA-2021-591b3a2af0\", \"refsource\": \"FEDORA\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Use after free\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-30633\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"chrome-cve-admin@google.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-30633\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:25:29.633Z\", \"dateReserved\": \"2021-04-13T00:00:00.000Z\", \"assignerOrgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"datePublished\": \"2021-10-08T20:50:29.000Z\", \"assignerShortName\": \"Chrome\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2021-AVI-701
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 93.0.4577.82",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30632"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 13 septembre 2021",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2021-AVI-716
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge (basé sur Chromium). Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 93.0.961.52",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-716",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge\n(bas\u00e9 sur Chromium). Elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30627 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30627"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30629 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30629"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30625 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30625"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30628 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30628"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30631 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30631"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30633 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30633"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30626 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30626"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30630 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30630"
}
]
}
CERTFR-2021-AVI-701
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 93.0.4577.82",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30632"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-701",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 13 septembre 2021",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2021-AVI-716
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge (basé sur Chromium). Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 93.0.961.52",
"product": {
"name": "Edge",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30627"
},
{
"name": "CVE-2021-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30629"
},
{
"name": "CVE-2021-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30631"
},
{
"name": "CVE-2021-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30630"
},
{
"name": "CVE-2021-30628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30628"
},
{
"name": "CVE-2021-30625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30625"
},
{
"name": "CVE-2021-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30633"
},
{
"name": "CVE-2021-30626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30626"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-716",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-09-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge\n(bas\u00e9 sur Chromium). Elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30627 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30627"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30629 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30629"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30625 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30625"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30628 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30628"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30631 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30631"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30633 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30633"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30626 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30626"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2021-30630 du 16 septembre 2021",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-30630"
}
]
}
BDU:2021-04791
Vulnerability from fstec - Published: 08.09.2021{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Google Inc, Microsoft Corp, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), \u0434\u043e 93.0.4577.82 (Google Chrome), \u0434\u043e 93.0.961.52 (Microsoft Edge), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.3 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Google Chrome:\nhttps://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\n\n\u0414\u043b\u044f Microsoft Edge:\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-30633\n\n\u0414\u043b\u044f Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2021-1126SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0114SE47\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0441\u043d\u043e\u0432\u0430:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 94.0.4606.81+repack-1osnova1.1\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "08.09.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.09.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-04791",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-30633",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Google Chrome, Microsoft Edge, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u0434\u043b\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 Indexed DB API \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u0434\u043b\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 Indexed DB API \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Google Chrome \u0438 Microsoft Edge \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0451 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0439 \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-30633\nhttps://www.cybersecurity-help.cz/vdb/SB2021091704\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2021-1126SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-0114SE47\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.3/\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2021-73431
Vulnerability from cnvd - Published: 2021-09-26厂商已发布了漏洞修复程序,请及时关注更新: https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
| Name | Google Chrome <93.0.4577.82 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-30633",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-30633"
}
},
"description": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002\n\nGoogle Chrome Indexed DB API\u5b58\u5728\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\u60c5\u51b5\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-73431",
"openTime": "2021-09-26",
"patchDescription": "Google Chrome\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\u3002\r\n\r\nGoogle Chrome Indexed DB API\u5b58\u5728\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6b64\u6f0f\u6d1e\u5728\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\u60c5\u51b5\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Chrome Indexed DB API\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Google Chrome \u003c93.0.4577.82"
},
"referenceLink": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"serverity": "\u9ad8",
"submitTime": "2021-09-14",
"title": "Google Chrome Indexed DB API\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
FKIE_CVE-2021-30633
Vulnerability from fkie_nvd - Published: 2021-10-08 21:15 - Updated: 2025-10-24 21:089.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 35 |
{
"cisaActionDue": "2021-11-17",
"cisaExploitAdd": "2021-11-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Google Chromium Indexed DB API Use-After-Free Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5BE60BD-114C-4278-9F01-065274D86699",
"versionEndExcluding": "93.0.4577.82",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page."
},
{
"lang": "es",
"value": "Un uso de memoria previamente liberada en la API de la base de datos Indexada en Google Chrome versiones anteriores a 93.0.4577.82, permit\u00eda a un atacante remoto que hubiera comprometido el proceso del renderizador llevar a cabo potencialmente un escape de sandbox por medio de una p\u00e1gina HTML dise\u00f1ada"
}
],
"id": "CVE-2021-30633",
"lastModified": "2025-10-24T21:08:14.887",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2021-10-08T21:15:07.650",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required"
],
"url": "https://crbug.com/1247766"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://crbug.com/1247766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30633"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-7PPH-HP2F-GXFG
Vulnerability from github – Published: 2022-05-24 19:17 – Updated: 2025-10-22 00:32Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
{
"affected": [],
"aliases": [
"CVE-2021-30633"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-10-08T21:15:00Z",
"severity": "CRITICAL"
},
"details": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"id": "GHSA-7pph-hp2f-gxfg",
"modified": "2025-10-22T00:32:25Z",
"published": "2022-05-24T19:17:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30633"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"type": "WEB",
"url": "https://crbug.com/1247766"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30633"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2021-30633
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-30633",
"description": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"id": "GSD-2021-30633",
"references": [
"https://www.suse.com/security/cve/CVE-2021-30633.html",
"https://advisories.mageia.org/CVE-2021-30633.html",
"https://security.archlinux.org/CVE-2021-30633"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-30633"
],
"details": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"id": "GSD-2021-30633",
"modified": "2023-12-13T01:23:31.750463Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cisa.gov": {
"cveID": "CVE-2021-30633",
"dateAdded": "2021-11-03",
"dueDate": "2021-11-17",
"product": "Chrome",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Google Chrome Use-After-Free vulnerability",
"vendorProject": "Google",
"vulnerabilityName": "Google Chrome Use-After-Free Vulnerability"
},
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2021-30633",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "93.0.4577.82"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1247766",
"refsource": "MISC",
"url": "https://crbug.com/1247766"
},
{
"name": "FEDORA-2021-ab09a05562",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "93.0.4577.82",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2021-30633"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://crbug.com/1247766",
"refsource": "MISC",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://crbug.com/1247766"
},
{
"name": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html"
},
{
"name": "FEDORA-2021-ab09a05562",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/"
},
{
"name": "FEDORA-2021-591b3a2af0",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
},
"lastModifiedDate": "2021-11-23T21:48Z",
"publishedDate": "2021-10-08T21:15Z"
}
}
}
OPENSUSE-SU-2021:1300-1
Vulnerability from csaf_opensuse - Published: 2021-09-21 19:26 - Updated: 2021-09-21 19:26| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium 93.0.4577.63 (boo#1190096):\n\n* CVE-2021-30606: Use after free in Blink\n* CVE-2021-30607: Use after free in Permissions\n* CVE-2021-30608: Use after free in Web Share\n* CVE-2021-30609: Use after free in Sign-In\n* CVE-2021-30610: Use after free in Extensions API\n* CVE-2021-30611: Use after free in WebRTC\n* CVE-2021-30612: Use after free in WebRTC\n* CVE-2021-30613: Use after free in Base internals\n* CVE-2021-30614: Heap buffer overflow in TabStrip\n* CVE-2021-30615: Cross-origin data leak in Navigation\n* CVE-2021-30616: Use after free in Media\n* CVE-2021-30617: Policy bypass in Blink\n* CVE-2021-30618: Inappropriate implementation in DevTools\n* CVE-2021-30619: UI Spoofing in Autofill\n* CVE-2021-30620: Insufficient policy enforcement in Blink\n* CVE-2021-30621: UI Spoofing in Autofill\n* CVE-2021-30622: Use after free in WebApp Installs\n* CVE-2021-30623: Use after free in Bookmarks\n* CVE-2021-30624: Use after free in Autofill\n\nChromium 93.0.4577.82 (boo#1190476):\n\n* CVE-2021-30625: Use after free in Selection API\n* CVE-2021-30626: Out of bounds memory access in ANGLE\n* CVE-2021-30627: Type Confusion in Blink layout\n* CVE-2021-30628: Stack buffer overflow in ANGLE\n* CVE-2021-30629: Use after free in Permissions\n* CVE-2021-30630: Inappropriate implementation in Blink\n* CVE-2021-30631: Type Confusion in Blink layout\n* CVE-2021-30632: Out of bounds write in V8\n* CVE-2021-30633: Use after free in Indexed DB API\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1300",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1300-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1300-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1300-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AFYTQFVWKBYVVXUN3DISYCDXS27AWFTC/"
},
{
"category": "self",
"summary": "SUSE Bug 1190096",
"url": "https://bugzilla.suse.com/1190096"
},
{
"category": "self",
"summary": "SUSE Bug 1190476",
"url": "https://bugzilla.suse.com/1190476"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30607 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30608 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30610 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30611 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30613 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30614 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30614/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30615 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30616 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30617 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30618 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30619 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30620 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30621 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30622 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30623 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30625 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30626 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30626/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30627 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30628 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30629 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30630 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30631 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30632 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30632/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30633 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30633/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2021-09-21T19:26:47Z",
"generator": {
"date": "2021-09-21T19:26:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1300-1",
"initial_release_date": "2021-09-21T19:26:47Z",
"revision_history": [
{
"date": "2021-09-21T19:26:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"product": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"product_id": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"product": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"product_id": "chromium-93.0.4577.82-bp153.2.28.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"product": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"product_id": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"product": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"product_id": "chromium-93.0.4577.82-bp153.2.28.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP3",
"product": {
"name": "SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-93.0.4577.82-bp153.2.28.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
},
"product_reference": "chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30606"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30606 Use after free in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30606",
"url": "https://www.suse.com/security/cve/CVE-2021-30606"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30606",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30606"
},
{
"cve": "CVE-2021-30607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30607"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30607 Use after free in Permissions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30607",
"url": "https://www.suse.com/security/cve/CVE-2021-30607"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30607",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30607"
},
{
"cve": "CVE-2021-30608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30608"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30608 Use after free in Web Share",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30608",
"url": "https://www.suse.com/security/cve/CVE-2021-30608"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30608",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30608"
},
{
"cve": "CVE-2021-30609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30609"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30609 Use after free in Sign-In",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30609",
"url": "https://www.suse.com/security/cve/CVE-2021-30609"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30609",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30609"
},
{
"cve": "CVE-2021-30610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30610"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30610 Use after free in Extensions API",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30610",
"url": "https://www.suse.com/security/cve/CVE-2021-30610"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30610",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30610"
},
{
"cve": "CVE-2021-30611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30611"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30611 Use after free in WebRTC",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30611",
"url": "https://www.suse.com/security/cve/CVE-2021-30611"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30611",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30611"
},
{
"cve": "CVE-2021-30612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30612"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30612 Use after free in WebRTC",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30612",
"url": "https://www.suse.com/security/cve/CVE-2021-30612"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30612",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30612"
},
{
"cve": "CVE-2021-30613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30613"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30613 Use after free in Base internals",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30613",
"url": "https://www.suse.com/security/cve/CVE-2021-30613"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30613",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30613"
},
{
"cve": "CVE-2021-30614",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30614"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30614",
"url": "https://www.suse.com/security/cve/CVE-2021-30614"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30614",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30614"
},
{
"cve": "CVE-2021-30615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30615"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30615 Cross-origin data leak in Navigation",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30615",
"url": "https://www.suse.com/security/cve/CVE-2021-30615"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30615",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30615"
},
{
"cve": "CVE-2021-30616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30616"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30616 Use after free in Media",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30616",
"url": "https://www.suse.com/security/cve/CVE-2021-30616"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30616",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30616"
},
{
"cve": "CVE-2021-30617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30617"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30617 Policy bypass in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30617",
"url": "https://www.suse.com/security/cve/CVE-2021-30617"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30617",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30617"
},
{
"cve": "CVE-2021-30618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30618"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30618 Inappropriate implementation in DevTools",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30618",
"url": "https://www.suse.com/security/cve/CVE-2021-30618"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30618",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30618"
},
{
"cve": "CVE-2021-30619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30619"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30619 UI Spoofing in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30619",
"url": "https://www.suse.com/security/cve/CVE-2021-30619"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30619",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30619"
},
{
"cve": "CVE-2021-30620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30620"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30620",
"url": "https://www.suse.com/security/cve/CVE-2021-30620"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30620",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30620"
},
{
"cve": "CVE-2021-30621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30621"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30621 UI Spoofing in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30621",
"url": "https://www.suse.com/security/cve/CVE-2021-30621"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30621",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30621"
},
{
"cve": "CVE-2021-30622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30622"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30622 Use after free in WebApp Installs",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30622",
"url": "https://www.suse.com/security/cve/CVE-2021-30622"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30622",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30622"
},
{
"cve": "CVE-2021-30623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30623"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30623 Use after free in Bookmarks",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30623",
"url": "https://www.suse.com/security/cve/CVE-2021-30623"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30623",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30623"
},
{
"cve": "CVE-2021-30624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30624"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30624 Use after free in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30624",
"url": "https://www.suse.com/security/cve/CVE-2021-30624"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30624",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "moderate"
}
],
"title": "CVE-2021-30624"
},
{
"cve": "CVE-2021-30625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30625"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30625",
"url": "https://www.suse.com/security/cve/CVE-2021-30625"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30625",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30625"
},
{
"cve": "CVE-2021-30626",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30626"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30626",
"url": "https://www.suse.com/security/cve/CVE-2021-30626"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30626",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30626"
},
{
"cve": "CVE-2021-30627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30627"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30627",
"url": "https://www.suse.com/security/cve/CVE-2021-30627"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30627",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30627"
},
{
"cve": "CVE-2021-30628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30628"
}
],
"notes": [
{
"category": "general",
"text": "Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30628",
"url": "https://www.suse.com/security/cve/CVE-2021-30628"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30628",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30628"
},
{
"cve": "CVE-2021-30629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30629"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30629",
"url": "https://www.suse.com/security/cve/CVE-2021-30629"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30629",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30629"
},
{
"cve": "CVE-2021-30630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30630"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30630",
"url": "https://www.suse.com/security/cve/CVE-2021-30630"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30630",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30630"
},
{
"cve": "CVE-2021-30631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30631"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30631",
"url": "https://www.suse.com/security/cve/CVE-2021-30631"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30631",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30631"
},
{
"cve": "CVE-2021-30632",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30632"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30632",
"url": "https://www.suse.com/security/cve/CVE-2021-30632"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30632",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30632"
},
{
"cve": "CVE-2021-30633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30633"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30633",
"url": "https://www.suse.com/security/cve/CVE-2021-30633"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30633",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"SUSE Package Hub 15 SP3:chromium-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromedriver-93.0.4577.82-bp153.2.28.1.x86_64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.aarch64",
"openSUSE Leap 15.3:chromium-93.0.4577.82-bp153.2.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-21T19:26:47Z",
"details": "critical"
}
],
"title": "CVE-2021-30633"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.