Vulnerability from csaf_opensuse
Published
2023-05-27 12:01
Modified
2023-05-27 12:01
Summary
Security update for opera

Notes

Title of the patch
Security update for opera
Description of the patch
This update for opera fixes the following issues: - Update to 99.0.4788.13 * CHR-9290 Update Chromium on desktop-stable-113-4788 to 113.0.5672.127 * DNA-107317 __delayLoadHelper2 crash in crashreporter - The update to chromium 113.0.5672.127 fixes following issues: CVE-2023-2721, CVE-2023-2722, CVE-2023-2723, CVE-2023-2724, CVE-2023-2725, CVE-2023-2726 - Update to 99.0.4788.9 * CHR-9283 Update Chromium on desktop-stable-113-4788 to 113.0.5672.93 * DNA-107638 Translations for O99 * DNA-107678 Crash Report [@ BrowserContextKeyedServiceFactory:: BrowserContextKeyedServiceFactory(char const*, BrowserContextDependencyManager*) ] * DNA-107795 Fix wrong german translation of 'Close All Duplicate Tabs' * DNA-107800 Fonts on section#folder and AddSitePanel not readable when animated wallpaper chosen * DNA-107840 Promote O99 to stable - Update to 98.0.4759.39 * DNA-102363 ChromeFileSystemAccessPermissionContextTest. ConfirmSensitiveEntryAccess_DangerousFile fails * DNA-105534 [Add to Opera] Incorrect scroll on modal when browser window size is too small * DNA-106649 Opening new tab when pinned tab is active gives 2 active tabs * DNA-107226 Speed Dial freezes and empty space remains after Continue booking tile dragging * DNA-107435 Building archive_source_release target fails * DNA-107441 [Start page] Right mouse click on tile in continue on section opens target site in current tab * DNA-107508 Crash at permissions::PermissionRecoverySuccessRate Tracker::TrackUsage(ContentSettingsType) * DNA-107528 Handle real-time SD impression reporting * DNA-107546 Context menus broken with one workspace * DNA-107548 Paste from Context Menu doesn’t work for Search on StartPage * DNA-107560 Optimize real-time SD impression reporting - Update to 98.0.4759.15 * CHR-9259 Update Chromium on desktop-stable-112-4759 to 112.0.5615.121 * CHR-9264 Update Chromium on desktop-stable-112-4759 to 112.0.5615.165 * DNA-104949 Cleanup reauthorizer and permission * DNA-106748 Presubmit problems * DNA-107262 Delete faulty translations - The update to chromium 112.0.5615.165 fixes following issues: CVE-2023-2133, CVE-2023-2134, CVE-2023-2135, CVE-2023-2136, CVE-2023-2137 - Changes in 98.0.4759.6 * CHR-9255 Update Chromium on desktop-stable-112-4759 to 112.0.5615.87 * DNA-106342 Crash when blocking cookies in sidebar web.infobars::InfoBarManager::AddInfoBar(std::Cr::unique_ptr, bool) * DNA-107054 Apply patch for CVE-2023-2033 * DNA-107141 Promote O98 to stable * DNA-107142 Translations for O98 - Update to 97.0.4719.83 * DNA-106342 Crash when blocking cookies in sidebar web. infobars::InfoBarManager::AddInfoBar(std::Cr::unique_ptr, bool) * DNA-106550 [SD][Drag&Drop] Create a static manual layout for speed dials * DNA-106791 Run smoketests on mac arm builds * DNA-107054 Apply patch for CVE-2023-2033 - Remove setup_repo.sh, fix non-executable-script rpmlint warning and we do not want create a repo - Update to 97.0.4719.63 * CHR-9245 Update Chromium on desktop-stable-111-4719 to 111.0.5563.147 * DNA-105919 Set new Baidu search string * DNA-106168 EasySetup update - Update to 97.0.4719.43 * CHR-9236 Update Chromium on desktop-stable-111-4719 to 111.0.5563.111 * DNA-105141 Tabs to the right of the currently active one swap their position with another when clicked * DNA-106044 Translations for O97 * DNA-106300 Fix rule for generating archive_browser_sym_files on crossplatform builds * DNA-106412 Content of popup not generated for some extensions when using more then one worksapce * DNA-106433 Extend Easy Setup API * DNA-106435 Increase timeout for the welcome page * DNA-106453 Public build from desktop-stable-111-4719 do not compile - The update to chromium 111.0.5563.111 fixes following issues: CVE-2023-1528, CVE-2023-1529, CVE-2023-1530, CVE-2023-1531, CVE-2023-1532, CVE-2023-1533, CVE-2023-1534 - Update to 97.0.4719.28 * DNA-106303 Extension should get proper parent window id from the sidebar API * DNA-106366 Opera crypto crashes on startup during session restore - Changes in 97.0.4719.26 * CHR-9225 Update Chromium on desktop-stable-111-4719 to 111.0.5563.65 * DNA-102778 Goth reports error for utils_api test * DNA-104983 Missing encryption option in sync settings * DNA-105293 add RateMe feature to Speed Dials and Suggested Speed Dials section * DNA-105299 Opera crash when closing tab by middle mouse button * DNA-105712 Update linux sandbox dependency for browsertests * DNA-105787 Settings extended with the AI section * DNA-105865 Add reload option for panels in opr.browserSidebarPrivate namespace * DNA-105944 Update checking of widevine certificate expiration to be independent from dateformat * DNA-105959 Update texts – native part * DNA-105961 Import translated texts – native part * DNA-105967 Crash at base::ObserverList::RemoveObserver(PrefObserver const*) * DNA-105973 Turn on #tab-tooltip-close-tabs on all streams * DNA-106061 Hide extension popup * DNA-106062 [Stable A/B Test] React Start Page for Austria, Italy, Spain and France 50% * DNA-106068 Extension shows if developer mode is enabled * DNA-106070 Feedback window for highlight popup displayed in wrong place * DNA-106079 EasySetup Disclaimer – Reduce size * DNA-106085 Crash at TabHoverCardController::OnViewIsDeleting(views::View*) * DNA-106086 Player home page does not show images in dark mode * DNA-106096 Increase prompt window in AB width * DNA-106109 Teasers on start page don’t show transparency * DNA-106114 AI Prompts button is after Reader Mode icon * DNA-106168 EasySetup update * DNA-106212 Promote O97 to stable * DNA-106225 Enable #shodan-extension for all streams * DNA-106229 Update J5 texts - The update to chromium 111.0.5563.65 fixes following issues: CVE-2023-1213, CVE-2023-1214, CVE-2023-1215, CVE-2023-1216, CVE-2023-1217, CVE-2023-1218, CVE-2023-1219, CVE-2023-1220, CVE-2023-1221, CVE-2023-1222, CVE-2023-1223, CVE-2023-1224, CVE-2023-1225, CVE-2023-1226, CVE-2023-1227, CVE-2023-1228, CVE-2023-1229, CVE-2023-1230, CVE-2023-1231, CVE-2023-1232, CVE-2023-1233, CVE-2023-1234, CVE-2023-1235, CVE-2023-1236 - Update to 96.0.4693.80 * CHR-9221 Update Chromium on desktop-stable-110-4693 to 110.0.5481.192 * DNA-104501 Opera don’t work with #high-efficiency-mode-available flag * DNA-105860 Enable #google-suggest-entities on all streams * DNA-106062 [Stable A/B Test] React Start Page for Austria, Italy, Spain and France 50% - Update to 96.0.4693.50 * DNA-104420 Creating mechanism to detect specific shortcut * DNA-104742 Wrong button place in opera tools section in sidebar menu * DNA-105141 Tabs to the right of the currently active one swap their position with another when clicked * DNA-105426 Add provisioning profiles during builds signing * DNA-105506 Replace all references to opera-api.com domain with opera-api2.com * DNA-105536 Enable kFeatureExtendedUnstoppableDomains for desktop * DNA-105727 [Rich Hints] Screenshot event must not collide with native PrtScr notification. * DNA-105740 [Rich Hints] Add event_user_survey to the whitelist
Patchnames
openSUSE-2023-114
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "Security update for opera",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "This update for opera fixes the following issues:\n\n- Update to 99.0.4788.13\n  * CHR-9290 Update Chromium on desktop-stable-113-4788 to\n    113.0.5672.127\n  * DNA-107317 __delayLoadHelper2 crash in crashreporter\n- The update to chromium 113.0.5672.127 fixes following issues:\n  CVE-2023-2721, CVE-2023-2722, CVE-2023-2723, CVE-2023-2724,\n  CVE-2023-2725, CVE-2023-2726\n\n- Update to 99.0.4788.9\n  * CHR-9283 Update Chromium on desktop-stable-113-4788 to\n    113.0.5672.93\n  * DNA-107638 Translations for O99\n  * DNA-107678 Crash Report [@ BrowserContextKeyedServiceFactory::\n    BrowserContextKeyedServiceFactory(char const*,\n    BrowserContextDependencyManager*) ]\n  * DNA-107795 Fix wrong german translation of\n    'Close All Duplicate Tabs'\n  * DNA-107800 Fonts on section#folder and AddSitePanel not\n    readable when animated wallpaper chosen\n  * DNA-107840 Promote O99 to stable\n\n- Update to 98.0.4759.39\n  * DNA-102363 ChromeFileSystemAccessPermissionContextTest.\n    ConfirmSensitiveEntryAccess_DangerousFile fails\n  * DNA-105534 [Add to Opera] Incorrect scroll on modal when\n    browser window size is too small\n  * DNA-106649 Opening new tab when pinned tab is active gives\n    2 active tabs\n  * DNA-107226 Speed Dial freezes and empty space remains after\n    Continue booking tile dragging\n  * DNA-107435 Building archive_source_release target fails\n  * DNA-107441 [Start page] Right mouse click on tile in continue\n    on section opens target site in current tab\n  * DNA-107508 Crash at permissions::PermissionRecoverySuccessRate\n    Tracker::TrackUsage(ContentSettingsType)\n  * DNA-107528 Handle real-time SD impression reporting\n  * DNA-107546 Context menus broken with one workspace\n  * DNA-107548 Paste from Context Menu doesn’t work for Search\n    on StartPage\n  * DNA-107560 Optimize real-time SD impression reporting\n\n- Update to 98.0.4759.15\n  * CHR-9259 Update Chromium on desktop-stable-112-4759 to\n    112.0.5615.121\n  * CHR-9264 Update Chromium on desktop-stable-112-4759 to\n    112.0.5615.165\n  * DNA-104949 Cleanup reauthorizer and permission\n  * DNA-106748 Presubmit problems\n  * DNA-107262 Delete faulty translations\n- The update to chromium 112.0.5615.165 fixes following issues:\n  CVE-2023-2133, CVE-2023-2134, CVE-2023-2135, CVE-2023-2136,\n  CVE-2023-2137\n- Changes in 98.0.4759.6\n  * CHR-9255 Update Chromium on desktop-stable-112-4759 to\n    112.0.5615.87\n  * DNA-106342 Crash when blocking cookies in sidebar \n    web.infobars::InfoBarManager::AddInfoBar(std::Cr::unique_ptr, bool)\n  * DNA-107054 Apply patch for CVE-2023-2033\n  * DNA-107141 Promote O98 to stable\n  * DNA-107142 Translations for O98\n\n- Update to 97.0.4719.83\n  * DNA-106342 Crash when blocking cookies in sidebar web.\n    infobars::InfoBarManager::AddInfoBar(std::Cr::unique_ptr, bool)\n  * DNA-106550 [SD][Drag&Drop] Create a static manual layout for\n    speed dials\n  * DNA-106791 Run smoketests on mac arm builds\n  * DNA-107054 Apply patch for CVE-2023-2033\n- Remove setup_repo.sh, fix non-executable-script rpmlint warning\n  and we do not want create a repo\n\n- Update to 97.0.4719.63\n  * CHR-9245 Update Chromium on desktop-stable-111-4719 to\n    111.0.5563.147\n  * DNA-105919 Set new Baidu search string\n  * DNA-106168 EasySetup update\n\n- Update to 97.0.4719.43\n  * CHR-9236 Update Chromium on desktop-stable-111-4719 to\n    111.0.5563.111\n  * DNA-105141 Tabs to the right of the currently active one swap\n    their position with another when clicked\n  * DNA-106044 Translations for O97\n  * DNA-106300 Fix rule for generating archive_browser_sym_files\n    on crossplatform builds\n  * DNA-106412 Content of popup not generated for some extensions\n    when using more then one worksapce\n  * DNA-106433 Extend Easy Setup API\n  * DNA-106435 Increase timeout for the welcome page\n  * DNA-106453 Public build from desktop-stable-111-4719 do\n    not compile\n- The update to chromium 111.0.5563.111 fixes following issues:\n  CVE-2023-1528, CVE-2023-1529, CVE-2023-1530, CVE-2023-1531,\n  CVE-2023-1532, CVE-2023-1533, CVE-2023-1534\n\n- Update to 97.0.4719.28\n  * DNA-106303 Extension should get proper parent window id from\n    the sidebar API\n  * DNA-106366 Opera crypto crashes on startup during session\n    restore\n- Changes in 97.0.4719.26\n  * CHR-9225 Update Chromium on desktop-stable-111-4719 to\n    111.0.5563.65\n  * DNA-102778 Goth reports error for utils_api test\n  * DNA-104983 Missing encryption option in sync settings\n  * DNA-105293 add RateMe feature to Speed Dials and Suggested\n    Speed Dials section\n  * DNA-105299 Opera crash when closing tab by middle mouse button\n  * DNA-105712 Update linux sandbox dependency for browsertests\n  * DNA-105787 Settings extended with the AI section\n  * DNA-105865 Add reload option for panels in\n    opr.browserSidebarPrivate namespace\n  * DNA-105944 Update checking of widevine certificate expiration\n    to be independent from dateformat\n  * DNA-105959 Update texts – native part\n  * DNA-105961 Import translated texts – native part\n  * DNA-105967 Crash at\n    base::ObserverList::RemoveObserver(PrefObserver const*)\n  * DNA-105973 Turn on #tab-tooltip-close-tabs on all streams\n  * DNA-106061 Hide extension popup\n  * DNA-106062 [Stable A/B Test] React Start Page for Austria,\n    Italy, Spain and France 50%\n  * DNA-106068 Extension shows if developer mode is enabled\n  * DNA-106070 Feedback window for highlight popup displayed in\n    wrong place\n  * DNA-106079 EasySetup Disclaimer – Reduce size\n  * DNA-106085 Crash at\n    TabHoverCardController::OnViewIsDeleting(views::View*)\n  * DNA-106086 Player home page does not show images in dark mode\n  * DNA-106096 Increase prompt window in AB width\n  * DNA-106109 Teasers on start page don’t show transparency\n  * DNA-106114 AI Prompts button is after Reader Mode icon\n  * DNA-106168 EasySetup update\n  * DNA-106212 Promote O97 to stable\n  * DNA-106225 Enable #shodan-extension for all streams\n  * DNA-106229 Update J5 texts\n- The update to chromium 111.0.5563.65 fixes following issues:\n  CVE-2023-1213, CVE-2023-1214, CVE-2023-1215, CVE-2023-1216,\n  CVE-2023-1217, CVE-2023-1218, CVE-2023-1219, CVE-2023-1220,\n  CVE-2023-1221, CVE-2023-1222, CVE-2023-1223, CVE-2023-1224,\n  CVE-2023-1225, CVE-2023-1226, CVE-2023-1227, CVE-2023-1228,\n  CVE-2023-1229, CVE-2023-1230, CVE-2023-1231, CVE-2023-1232,\n  CVE-2023-1233, CVE-2023-1234, CVE-2023-1235, CVE-2023-1236\n\n- Update to 96.0.4693.80\n  * CHR-9221 Update Chromium on desktop-stable-110-4693 to\n    110.0.5481.192\n  * DNA-104501 Opera don’t work with\n    #high-efficiency-mode-available flag\n  * DNA-105860 Enable #google-suggest-entities on all streams\n  * DNA-106062 [Stable A/B Test] React Start Page for Austria,\n    Italy, Spain and France 50%\n\n- Update to 96.0.4693.50\n  * DNA-104420 Creating mechanism to detect specific shortcut\n  * DNA-104742 Wrong button place in opera tools section in\n    sidebar menu\n  * DNA-105141 Tabs to the right of the currently active one swap\n    their position with another when clicked\n  * DNA-105426 Add provisioning profiles during builds signing\n  * DNA-105506 Replace all references to opera-api.com domain\n    with opera-api2.com\n  * DNA-105536 Enable kFeatureExtendedUnstoppableDomains\n    for desktop\n  * DNA-105727 [Rich Hints] Screenshot event must not collide with\n    native PrtScr notification.\n  * DNA-105740 [Rich Hints] Add event_user_survey to the whitelist\n",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "openSUSE-2023-114",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2023_0114-1.json",
         },
         {
            category: "self",
            summary: "URL for openSUSE-SU-2023:0114-1",
            url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOK6KL3HWOEESQP5YYTJH4ANDT2XMQRU/",
         },
         {
            category: "self",
            summary: "E-Mail link for openSUSE-SU-2023:0114-1",
            url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOK6KL3HWOEESQP5YYTJH4ANDT2XMQRU/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1213 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1213/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1214 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1214/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1215 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1215/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1216 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1216/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1217 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1217/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1218 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1218/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1219 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1219/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1220 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1220/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1221 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1221/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1222 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1222/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1223 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1223/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1224 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1224/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1225 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1225/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1226 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1226/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1227 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1227/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1228 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1228/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1229 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1229/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1230 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1230/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1231 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1231/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1232 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1232/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1233 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1233/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1234 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1234/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1235 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1235/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1236 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1236/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1528 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1528/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1529 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1529/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1530 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1530/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1531 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1531/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1532 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1532/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1533 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1533/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-1534 page",
            url: "https://www.suse.com/security/cve/CVE-2023-1534/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2033 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2033/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2133 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2133/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2134 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2134/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2135 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2135/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2136 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2136/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2137 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2137/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2721 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2721/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2722 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2722/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2723 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2723/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2724 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2724/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2725 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2725/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2023-2726 page",
            url: "https://www.suse.com/security/cve/CVE-2023-2726/",
         },
      ],
      title: "Security update for opera",
      tracking: {
         current_release_date: "2023-05-27T12:01:46Z",
         generator: {
            date: "2023-05-27T12:01:46Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "openSUSE-SU-2023:0114-1",
         initial_release_date: "2023-05-27T12:01:46Z",
         revision_history: [
            {
               date: "2023-05-27T12:01:46Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "opera-99.0.4788.13-lp154.2.47.1.x86_64",
                        product: {
                           name: "opera-99.0.4788.13-lp154.2.47.1.x86_64",
                           product_id: "opera-99.0.4788.13-lp154.2.47.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "openSUSE Leap 15.4 NonFree",
                        product: {
                           name: "openSUSE Leap 15.4 NonFree",
                           product_id: "openSUSE Leap 15.4 NonFree",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:leap:15.4",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "opera-99.0.4788.13-lp154.2.47.1.x86_64 as component of openSUSE Leap 15.4 NonFree",
               product_id: "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            },
            product_reference: "opera-99.0.4788.13-lp154.2.47.1.x86_64",
            relates_to_product_reference: "openSUSE Leap 15.4 NonFree",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2023-1213",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1213",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in Swiftshader in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1213",
               url: "https://www.suse.com/security/cve/CVE-2023-1213",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1213",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1213",
      },
      {
         cve: "CVE-2023-1214",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1214",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Type confusion in V8 in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1214",
               url: "https://www.suse.com/security/cve/CVE-2023-1214",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1214",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1214",
      },
      {
         cve: "CVE-2023-1215",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1215",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Type confusion in CSS in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1215",
               url: "https://www.suse.com/security/cve/CVE-2023-1215",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1215",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1215",
      },
      {
         cve: "CVE-2023-1216",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1216",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1216",
               url: "https://www.suse.com/security/cve/CVE-2023-1216",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1216",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1216",
      },
      {
         cve: "CVE-2023-1217",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1217",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1217",
               url: "https://www.suse.com/security/cve/CVE-2023-1217",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1217",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1217",
      },
      {
         cve: "CVE-2023-1218",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1218",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in WebRTC in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1218",
               url: "https://www.suse.com/security/cve/CVE-2023-1218",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1218",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1218",
      },
      {
         cve: "CVE-2023-1219",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1219",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Heap buffer overflow in Metrics in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1219",
               url: "https://www.suse.com/security/cve/CVE-2023-1219",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1219",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1219",
      },
      {
         cve: "CVE-2023-1220",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1220",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Heap buffer overflow in UMA in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1220",
               url: "https://www.suse.com/security/cve/CVE-2023-1220",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1220",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1220",
      },
      {
         cve: "CVE-2023-1221",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1221",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1221",
               url: "https://www.suse.com/security/cve/CVE-2023-1221",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1221",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1221",
      },
      {
         cve: "CVE-2023-1222",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1222",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Heap buffer overflow in Web Audio API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1222",
               url: "https://www.suse.com/security/cve/CVE-2023-1222",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1222",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1222",
      },
      {
         cve: "CVE-2023-1223",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1223",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient policy enforcement in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1223",
               url: "https://www.suse.com/security/cve/CVE-2023-1223",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1223",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1223",
      },
      {
         cve: "CVE-2023-1224",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1224",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1224",
               url: "https://www.suse.com/security/cve/CVE-2023-1224",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1224",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1224",
      },
      {
         cve: "CVE-2023-1225",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1225",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient policy enforcement in Navigation in Google Chrome on iOS prior to 111.0.5563.64 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1225",
               url: "https://www.suse.com/security/cve/CVE-2023-1225",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1225",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1225",
      },
      {
         cve: "CVE-2023-1226",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1226",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1226",
               url: "https://www.suse.com/security/cve/CVE-2023-1226",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1226",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1226",
      },
      {
         cve: "CVE-2023-1227",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1227",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1227",
               url: "https://www.suse.com/security/cve/CVE-2023-1227",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1227",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1227",
      },
      {
         cve: "CVE-2023-1228",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1228",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1228",
               url: "https://www.suse.com/security/cve/CVE-2023-1228",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1228",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1228",
      },
      {
         cve: "CVE-2023-1229",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1229",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Inappropriate implementation in Permission prompts in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1229",
               url: "https://www.suse.com/security/cve/CVE-2023-1229",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1229",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1229",
      },
      {
         cve: "CVE-2023-1230",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1230",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1230",
               url: "https://www.suse.com/security/cve/CVE-2023-1230",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1230",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1230",
      },
      {
         cve: "CVE-2023-1231",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1231",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1231",
               url: "https://www.suse.com/security/cve/CVE-2023-1231",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1231",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1231",
      },
      {
         cve: "CVE-2023-1232",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1232",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to obtain potentially sensitive information from API via a crafted HTML page. (Chromium security severity: Low)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1232",
               url: "https://www.suse.com/security/cve/CVE-2023-1232",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1232",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1232",
      },
      {
         cve: "CVE-2023-1233",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1233",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Insufficient policy enforcement in Resource Timing in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from API via a crafted Chrome Extension. (Chromium security severity: Low)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1233",
               url: "https://www.suse.com/security/cve/CVE-2023-1233",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1233",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1233",
      },
      {
         cve: "CVE-2023-1234",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1234",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Inappropriate implementation in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1234",
               url: "https://www.suse.com/security/cve/CVE-2023-1234",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1234",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1234",
      },
      {
         cve: "CVE-2023-1235",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1235",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Type confusion in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted UI interaction. (Chromium security severity: Low)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1235",
               url: "https://www.suse.com/security/cve/CVE-2023-1235",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1235",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1235",
      },
      {
         cve: "CVE-2023-1236",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1236",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Inappropriate implementation in Internals in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to spoof the origin of an iframe via a crafted HTML page. (Chromium security severity: Low)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1236",
               url: "https://www.suse.com/security/cve/CVE-2023-1236",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209040 for CVE-2023-1236",
               url: "https://bugzilla.suse.com/1209040",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-1236",
      },
      {
         cve: "CVE-2023-1528",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1528",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1528",
               url: "https://www.suse.com/security/cve/CVE-2023-1528",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209598 for CVE-2023-1528",
               url: "https://bugzilla.suse.com/1209598",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-1528",
      },
      {
         cve: "CVE-2023-1529",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1529",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1529",
               url: "https://www.suse.com/security/cve/CVE-2023-1529",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209598 for CVE-2023-1529",
               url: "https://bugzilla.suse.com/1209598",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-1529",
      },
      {
         cve: "CVE-2023-1530",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1530",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1530",
               url: "https://www.suse.com/security/cve/CVE-2023-1530",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209598 for CVE-2023-1530",
               url: "https://bugzilla.suse.com/1209598",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-1530",
      },
      {
         cve: "CVE-2023-1531",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1531",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1531",
               url: "https://www.suse.com/security/cve/CVE-2023-1531",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209598 for CVE-2023-1531",
               url: "https://bugzilla.suse.com/1209598",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-1531",
      },
      {
         cve: "CVE-2023-1532",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1532",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Out of bounds read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1532",
               url: "https://www.suse.com/security/cve/CVE-2023-1532",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209598 for CVE-2023-1532",
               url: "https://bugzilla.suse.com/1209598",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-1532",
      },
      {
         cve: "CVE-2023-1533",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1533",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in WebProtect in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1533",
               url: "https://www.suse.com/security/cve/CVE-2023-1533",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209598 for CVE-2023-1533",
               url: "https://bugzilla.suse.com/1209598",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-1533",
      },
      {
         cve: "CVE-2023-1534",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-1534",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-1534",
               url: "https://www.suse.com/security/cve/CVE-2023-1534",
            },
            {
               category: "external",
               summary: "SUSE Bug 1209598 for CVE-2023-1534",
               url: "https://bugzilla.suse.com/1209598",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-1534",
      },
      {
         cve: "CVE-2023-2033",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2033",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2033",
               url: "https://www.suse.com/security/cve/CVE-2023-2033",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210478 for CVE-2023-2033",
               url: "https://bugzilla.suse.com/1210478",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-2033",
      },
      {
         cve: "CVE-2023-2133",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2133",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2133",
               url: "https://www.suse.com/security/cve/CVE-2023-2133",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210618 for CVE-2023-2133",
               url: "https://bugzilla.suse.com/1210618",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-2133",
      },
      {
         cve: "CVE-2023-2134",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2134",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2134",
               url: "https://www.suse.com/security/cve/CVE-2023-2134",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210618 for CVE-2023-2134",
               url: "https://bugzilla.suse.com/1210618",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-2134",
      },
      {
         cve: "CVE-2023-2135",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2135",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2135",
               url: "https://www.suse.com/security/cve/CVE-2023-2135",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210618 for CVE-2023-2135",
               url: "https://bugzilla.suse.com/1210618",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-2135",
      },
      {
         cve: "CVE-2023-2136",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2136",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2136",
               url: "https://www.suse.com/security/cve/CVE-2023-2136",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210618 for CVE-2023-2136",
               url: "https://bugzilla.suse.com/1210618",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 9.6,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "critical",
            },
         ],
         title: "CVE-2023-2136",
      },
      {
         cve: "CVE-2023-2137",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2137",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2137",
               url: "https://www.suse.com/security/cve/CVE-2023-2137",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210618 for CVE-2023-2137",
               url: "https://bugzilla.suse.com/1210618",
            },
            {
               category: "external",
               summary: "SUSE Bug 1210660 for CVE-2023-2137",
               url: "https://bugzilla.suse.com/1210660",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-2137",
      },
      {
         cve: "CVE-2023-2721",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2721",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in Navigation in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2721",
               url: "https://www.suse.com/security/cve/CVE-2023-2721",
            },
            {
               category: "external",
               summary: "SUSE Bug 1211442 for CVE-2023-2721",
               url: "https://bugzilla.suse.com/1211442",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-2721",
      },
      {
         cve: "CVE-2023-2722",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2722",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2722",
               url: "https://www.suse.com/security/cve/CVE-2023-2722",
            },
            {
               category: "external",
               summary: "SUSE Bug 1211442 for CVE-2023-2722",
               url: "https://bugzilla.suse.com/1211442",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-2722",
      },
      {
         cve: "CVE-2023-2723",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2723",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2723",
               url: "https://www.suse.com/security/cve/CVE-2023-2723",
            },
            {
               category: "external",
               summary: "SUSE Bug 1211442 for CVE-2023-2723",
               url: "https://bugzilla.suse.com/1211442",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-2723",
      },
      {
         cve: "CVE-2023-2724",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2724",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2724",
               url: "https://www.suse.com/security/cve/CVE-2023-2724",
            },
            {
               category: "external",
               summary: "SUSE Bug 1211442 for CVE-2023-2724",
               url: "https://bugzilla.suse.com/1211442",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-2724",
      },
      {
         cve: "CVE-2023-2725",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2725",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2725",
               url: "https://www.suse.com/security/cve/CVE-2023-2725",
            },
            {
               category: "external",
               summary: "SUSE Bug 1211442 for CVE-2023-2725",
               url: "https://bugzilla.suse.com/1211442",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-2725",
      },
      {
         cve: "CVE-2023-2726",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2023-2726",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. (Chromium security severity: Medium)",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2023-2726",
               url: "https://www.suse.com/security/cve/CVE-2023-2726",
            },
            {
               category: "external",
               summary: "SUSE Bug 1211442 for CVE-2023-2726",
               url: "https://bugzilla.suse.com/1211442",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Leap 15.4 NonFree:opera-99.0.4788.13-lp154.2.47.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2023-05-27T12:01:46Z",
               details: "important",
            },
         ],
         title: "CVE-2023-2726",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.