OPENSUSE-SU-2026:10778-1
Vulnerability from csaf_opensuse - Published: 2026-05-14 00:00 - Updated: 2026-05-14 00:00Summary
chromedriver-148.0.7778.167-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: chromedriver-148.0.7778.167-1.1 on GA media
Description of the patch: These are all security issues fixed in the chromedriver-148.0.7778.167-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2026-10778
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
9.6 (Critical)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
8.8 (High)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
References
383 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "chromedriver-148.0.7778.167-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the chromedriver-148.0.7778.167-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10778",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10778-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7896 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7897 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7898 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7899 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7899/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7900 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7901 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7902 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7903 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7904 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7905 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7906 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7907 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7908 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7909 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7910 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7911 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7912 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7913 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7914 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7914/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7915 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7915/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7916 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7917 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7918 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7919 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7920 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7920/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7921 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7922 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7923 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7924 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7925 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7925/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7926 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7927 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7928 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7928/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7929 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7929/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7930 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7930/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7931 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7931/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7932 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7933 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7933/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7934 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7935 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7935/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7936 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7936/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7937 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7937/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7938 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7939 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7940 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7941 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7942 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7943 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7943/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7944 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7945 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7946 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7947 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7948 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7949 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7949/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7950 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7951 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7951/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7952 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7953 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7953/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7954 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7955 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7956 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7956/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7957 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7957/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7958 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7959 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7959/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7960 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7960/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7961 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7962 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7962/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7963 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7963/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7964 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7965 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7965/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7966 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7967 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7967/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7968 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7968/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7969 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7969/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7970 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7970/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7971 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7972 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7973 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7974 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7975 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7976 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7977 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7978 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7979 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7980 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7981 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7982 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7983 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7983/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7984 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7985 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7986 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7986/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7987 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7987/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7988 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7988/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7989 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7990 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7991 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7991/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7992 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7992/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7993 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7993/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7994 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7995 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7996 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7997 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7998 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-7999 page",
"url": "https://www.suse.com/security/cve/CVE-2026-7999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8000 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8001 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8002 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8004 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8005 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8005/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8006 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8007 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8007/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8008 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8009 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8009/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8010 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8011 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8012 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8013 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8014 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8015 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8015/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8016 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8017 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8018 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8019 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8020 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8021 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-8022 page",
"url": "https://www.suse.com/security/cve/CVE-2026-8022/"
}
],
"title": "chromedriver-148.0.7778.167-1.1 on GA media",
"tracking": {
"current_release_date": "2026-05-14T00:00:00Z",
"generator": {
"date": "2026-05-14T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10778-1",
"initial_release_date": "2026-05-14T00:00:00Z",
"revision_history": [
{
"date": "2026-05-14T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-148.0.7778.167-1.1.aarch64",
"product": {
"name": "chromedriver-148.0.7778.167-1.1.aarch64",
"product_id": "chromedriver-148.0.7778.167-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-148.0.7778.167-1.1.aarch64",
"product": {
"name": "chromium-148.0.7778.167-1.1.aarch64",
"product_id": "chromium-148.0.7778.167-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-148.0.7778.167-1.1.ppc64le",
"product": {
"name": "chromedriver-148.0.7778.167-1.1.ppc64le",
"product_id": "chromedriver-148.0.7778.167-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "chromium-148.0.7778.167-1.1.ppc64le",
"product": {
"name": "chromium-148.0.7778.167-1.1.ppc64le",
"product_id": "chromium-148.0.7778.167-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-148.0.7778.167-1.1.s390x",
"product": {
"name": "chromedriver-148.0.7778.167-1.1.s390x",
"product_id": "chromedriver-148.0.7778.167-1.1.s390x"
}
},
{
"category": "product_version",
"name": "chromium-148.0.7778.167-1.1.s390x",
"product": {
"name": "chromium-148.0.7778.167-1.1.s390x",
"product_id": "chromium-148.0.7778.167-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-148.0.7778.167-1.1.x86_64",
"product": {
"name": "chromedriver-148.0.7778.167-1.1.x86_64",
"product_id": "chromedriver-148.0.7778.167-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-148.0.7778.167-1.1.x86_64",
"product": {
"name": "chromium-148.0.7778.167-1.1.x86_64",
"product_id": "chromium-148.0.7778.167-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-148.0.7778.167-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64"
},
"product_reference": "chromedriver-148.0.7778.167-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-148.0.7778.167-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le"
},
"product_reference": "chromedriver-148.0.7778.167-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-148.0.7778.167-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x"
},
"product_reference": "chromedriver-148.0.7778.167-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-148.0.7778.167-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64"
},
"product_reference": "chromedriver-148.0.7778.167-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-148.0.7778.167-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64"
},
"product_reference": "chromium-148.0.7778.167-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-148.0.7778.167-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le"
},
"product_reference": "chromium-148.0.7778.167-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-148.0.7778.167-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x"
},
"product_reference": "chromium-148.0.7778.167-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-148.0.7778.167-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
},
"product_reference": "chromium-148.0.7778.167-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-7896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7896"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in Blink in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7896",
"url": "https://www.suse.com/security/cve/CVE-2026-7896"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7896",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7896"
},
{
"cve": "CVE-2026-7897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7897"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Mobile in Google Chrome on iOS prior to 148.0.7778.96 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7897",
"url": "https://www.suse.com/security/cve/CVE-2026-7897"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7897",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7897"
},
{
"cve": "CVE-2026-7898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7898"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Chromoting in Google Chrome on Linux prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7898",
"url": "https://www.suse.com/security/cve/CVE-2026-7898"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7898",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7898"
},
{
"cve": "CVE-2026-7899",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7899"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read and write in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7899",
"url": "https://www.suse.com/security/cve/CVE-2026-7899"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7899",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7899"
},
{
"cve": "CVE-2026-7900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7900"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in ANGLE in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7900",
"url": "https://www.suse.com/security/cve/CVE-2026-7900"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7900",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7900"
},
{
"cve": "CVE-2026-7901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7901"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in ANGLE in Google Chrome on Mac prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7901",
"url": "https://www.suse.com/security/cve/CVE-2026-7901"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7901",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7901"
},
{
"cve": "CVE-2026-7902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7902"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7902",
"url": "https://www.suse.com/security/cve/CVE-2026-7902"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7902",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7902"
},
{
"cve": "CVE-2026-7903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7903"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in ANGLE in Google Chrome on Mac,Windows prior to 148.0.7778.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7903",
"url": "https://www.suse.com/security/cve/CVE-2026-7903"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7903",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7903"
},
{
"cve": "CVE-2026-7904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7904"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Fonts in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7904",
"url": "https://www.suse.com/security/cve/CVE-2026-7904"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7904",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7904"
},
{
"cve": "CVE-2026-7905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7905"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Media in Google Chrome on Android prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7905",
"url": "https://www.suse.com/security/cve/CVE-2026-7905"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7905",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7905"
},
{
"cve": "CVE-2026-7906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7906"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in SVG in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7906",
"url": "https://www.suse.com/security/cve/CVE-2026-7906"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7906",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7906"
},
{
"cve": "CVE-2026-7907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7907"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in DOM in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7907",
"url": "https://www.suse.com/security/cve/CVE-2026-7907"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7907",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7907"
},
{
"cve": "CVE-2026-7908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7908"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Fullscreen in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7908",
"url": "https://www.suse.com/security/cve/CVE-2026-7908"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7908",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7908"
},
{
"cve": "CVE-2026-7909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7909"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in ServiceWorker in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7909",
"url": "https://www.suse.com/security/cve/CVE-2026-7909"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7909",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7909"
},
{
"cve": "CVE-2026-7910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7910"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Views in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7910",
"url": "https://www.suse.com/security/cve/CVE-2026-7910"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7910",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7910"
},
{
"cve": "CVE-2026-7911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7911"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Aura in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7911",
"url": "https://www.suse.com/security/cve/CVE-2026-7911"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7911",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7911"
},
{
"cve": "CVE-2026-7912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7912"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in GPU in Google Chrome on Android prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7912",
"url": "https://www.suse.com/security/cve/CVE-2026-7912"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7912",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7912"
},
{
"cve": "CVE-2026-7913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7913"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in DevTools in Google Chrome on Android prior to 148.0.7778.96 allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7913",
"url": "https://www.suse.com/security/cve/CVE-2026-7913"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7913",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7913"
},
{
"cve": "CVE-2026-7914",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7914"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in Accessibility in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7914",
"url": "https://www.suse.com/security/cve/CVE-2026-7914"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7914",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7914"
},
{
"cve": "CVE-2026-7915",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7915"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in DevTools in Google Chrome on Android prior to 148.0.7778.96 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7915",
"url": "https://www.suse.com/security/cve/CVE-2026-7915"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7915",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7915"
},
{
"cve": "CVE-2026-7916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7916"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in InterestGroups in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7916",
"url": "https://www.suse.com/security/cve/CVE-2026-7916"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7916",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7916"
},
{
"cve": "CVE-2026-7917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7917"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Fullscreen in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7917",
"url": "https://www.suse.com/security/cve/CVE-2026-7917"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7917",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7917"
},
{
"cve": "CVE-2026-7918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7918"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7918",
"url": "https://www.suse.com/security/cve/CVE-2026-7918"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7918",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7918"
},
{
"cve": "CVE-2026-7919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7919"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Aura in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7919",
"url": "https://www.suse.com/security/cve/CVE-2026-7919"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7919",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7919"
},
{
"cve": "CVE-2026-7920",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7920"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Skia in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7920",
"url": "https://www.suse.com/security/cve/CVE-2026-7920"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7920",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7920"
},
{
"cve": "CVE-2026-7921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7921"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Passwords in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7921",
"url": "https://www.suse.com/security/cve/CVE-2026-7921"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7921",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7921"
},
{
"cve": "CVE-2026-7922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7922"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in ServiceWorker in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7922",
"url": "https://www.suse.com/security/cve/CVE-2026-7922"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7922",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7922"
},
{
"cve": "CVE-2026-7923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7923"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in Skia in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7923",
"url": "https://www.suse.com/security/cve/CVE-2026-7923"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7923",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7923"
},
{
"cve": "CVE-2026-7924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7924"
}
],
"notes": [
{
"category": "general",
"text": "Uninitialized Use in Dawn in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7924",
"url": "https://www.suse.com/security/cve/CVE-2026-7924"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7924",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7924"
},
{
"cve": "CVE-2026-7925",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7925"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Chromoting in Google Chrome on Windows prior to 148.0.7778.96 allowed a local attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7925",
"url": "https://www.suse.com/security/cve/CVE-2026-7925"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7925",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7925"
},
{
"cve": "CVE-2026-7926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7926"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PresentationAPI in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7926",
"url": "https://www.suse.com/security/cve/CVE-2026-7926"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7926",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7926"
},
{
"cve": "CVE-2026-7927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7927"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in Runtime in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7927",
"url": "https://www.suse.com/security/cve/CVE-2026-7927"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7927",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7927"
},
{
"cve": "CVE-2026-7928",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7928"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebRTC in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7928",
"url": "https://www.suse.com/security/cve/CVE-2026-7928"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7928",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7928"
},
{
"cve": "CVE-2026-7929",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7929"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in MediaRecording in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7929",
"url": "https://www.suse.com/security/cve/CVE-2026-7929"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7929",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7929"
},
{
"cve": "CVE-2026-7930",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7930"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Cookies in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7930",
"url": "https://www.suse.com/security/cve/CVE-2026-7930"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7930",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7930"
},
{
"cve": "CVE-2026-7931",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7931"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in iOS in Google Chrome on iOS prior to 148.0.7778.96 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7931",
"url": "https://www.suse.com/security/cve/CVE-2026-7931"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7931",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7931"
},
{
"cve": "CVE-2026-7932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7932"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Downloads in Google Chrome prior to 148.0.7778.96 allowed a local attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7932",
"url": "https://www.suse.com/security/cve/CVE-2026-7932"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7932",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7932"
},
{
"cve": "CVE-2026-7933",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7933"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in WebCodecs in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform an out of bounds memory read via a crafted video file. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7933",
"url": "https://www.suse.com/security/cve/CVE-2026-7933"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7933",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7933"
},
{
"cve": "CVE-2026-7934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7934"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Popup Blocker in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7934",
"url": "https://www.suse.com/security/cve/CVE-2026-7934"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7934",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7934"
},
{
"cve": "CVE-2026-7935",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7935"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Speech in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7935",
"url": "https://www.suse.com/security/cve/CVE-2026-7935"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7935",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7935"
},
{
"cve": "CVE-2026-7936",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7936"
}
],
"notes": [
{
"category": "general",
"text": "Object lifecycle issue in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7936",
"url": "https://www.suse.com/security/cve/CVE-2026-7936"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7936",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7936"
},
{
"cve": "CVE-2026-7937",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7937"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in DevTools in Google Chrome prior to 148.0.7778.96 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7937",
"url": "https://www.suse.com/security/cve/CVE-2026-7937"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7937",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7937"
},
{
"cve": "CVE-2026-7938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7938"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in CSS in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7938",
"url": "https://www.suse.com/security/cve/CVE-2026-7938"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7938",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7938"
},
{
"cve": "CVE-2026-7939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7939"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in SanitizerAPI in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7939",
"url": "https://www.suse.com/security/cve/CVE-2026-7939"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7939",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7939"
},
{
"cve": "CVE-2026-7940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7940"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 148.0.7778.96 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code inside a sandbox via a crafted Chrome Extension. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7940",
"url": "https://www.suse.com/security/cve/CVE-2026-7940"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7940",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7940"
},
{
"cve": "CVE-2026-7941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7941"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Mobile in Google Chrome on Android prior to 148.0.7778.96 allowed a local attacker to inject arbitrary scripts or HTML (UXSS) via a crafted Chrome Extension. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7941",
"url": "https://www.suse.com/security/cve/CVE-2026-7941"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7941",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7941"
},
{
"cve": "CVE-2026-7942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7942"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in ANGLE in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7942",
"url": "https://www.suse.com/security/cve/CVE-2026-7942"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7942",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7942"
},
{
"cve": "CVE-2026-7943",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7943"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in ANGLE in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7943",
"url": "https://www.suse.com/security/cve/CVE-2026-7943"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7943",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7943"
},
{
"cve": "CVE-2026-7944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7944"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Persistent Cache in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7944",
"url": "https://www.suse.com/security/cve/CVE-2026-7944"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7944",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7944"
},
{
"cve": "CVE-2026-7945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7945"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in COOP in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7945",
"url": "https://www.suse.com/security/cve/CVE-2026-7945"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7945",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7945"
},
{
"cve": "CVE-2026-7946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7946"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in WebUI in Google Chrome on Linux, Mac, Windows, ChromeOS prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7946",
"url": "https://www.suse.com/security/cve/CVE-2026-7946"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7946",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7946"
},
{
"cve": "CVE-2026-7947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7947"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Network in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7947",
"url": "https://www.suse.com/security/cve/CVE-2026-7947"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7947",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7947"
},
{
"cve": "CVE-2026-7948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7948"
}
],
"notes": [
{
"category": "general",
"text": "Race in Chromoting in Google Chrome on Windows prior to 148.0.7778.96 allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7948",
"url": "https://www.suse.com/security/cve/CVE-2026-7948"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7948",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7948"
},
{
"cve": "CVE-2026-7949",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7949"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Skia in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7949",
"url": "https://www.suse.com/security/cve/CVE-2026-7949"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7949",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7949"
},
{
"cve": "CVE-2026-7950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7950"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read and write in GFX in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform arbitrary read/write via malicious network traffic. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7950",
"url": "https://www.suse.com/security/cve/CVE-2026-7950"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7950",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7950"
},
{
"cve": "CVE-2026-7951",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7951"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7951",
"url": "https://www.suse.com/security/cve/CVE-2026-7951"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7951",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7951"
},
{
"cve": "CVE-2026-7952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7952"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Extensions in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7952",
"url": "https://www.suse.com/security/cve/CVE-2026-7952"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7952",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7952"
},
{
"cve": "CVE-2026-7953",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7953"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via malicious network traffic. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7953",
"url": "https://www.suse.com/security/cve/CVE-2026-7953"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7953",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7953"
},
{
"cve": "CVE-2026-7954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7954"
}
],
"notes": [
{
"category": "general",
"text": "Race in Shared Storage in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7954",
"url": "https://www.suse.com/security/cve/CVE-2026-7954"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7954",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7954"
},
{
"cve": "CVE-2026-7955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7955"
}
],
"notes": [
{
"category": "general",
"text": "Uninitialized Use in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7955",
"url": "https://www.suse.com/security/cve/CVE-2026-7955"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7955",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7955"
},
{
"cve": "CVE-2026-7956",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7956"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Navigation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7956",
"url": "https://www.suse.com/security/cve/CVE-2026-7956"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7956",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7956"
},
{
"cve": "CVE-2026-7957",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7957"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in Media in Google Chrome on Mac, iOS prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7957",
"url": "https://www.suse.com/security/cve/CVE-2026-7957"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7957",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7957"
},
{
"cve": "CVE-2026-7958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7958"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in ServiceWorker in Google Chrome prior to 148.0.7778.96 allowed an attacker who convinced a user to install a malicious extension to inject arbitrary scripts or HTML (UXSS) via a crafted Chrome Extension. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7958",
"url": "https://www.suse.com/security/cve/CVE-2026-7958"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7958",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7958"
},
{
"cve": "CVE-2026-7959",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7959"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Navigation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7959",
"url": "https://www.suse.com/security/cve/CVE-2026-7959"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7959",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7959"
},
{
"cve": "CVE-2026-7960",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7960"
}
],
"notes": [
{
"category": "general",
"text": "Race in Speech in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7960",
"url": "https://www.suse.com/security/cve/CVE-2026-7960"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7960",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7960"
},
{
"cve": "CVE-2026-7961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7961"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Permissions in Google Chrome prior to 148.0.7778.96 allowed an attacker on the local network segment to leak cross-origin data via malicious network traffic. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7961",
"url": "https://www.suse.com/security/cve/CVE-2026-7961"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7961",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7961"
},
{
"cve": "CVE-2026-7962",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7962"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in DirectSockets in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform arbitrary read/write via a crafted Chrome Extension. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7962",
"url": "https://www.suse.com/security/cve/CVE-2026-7962"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7962",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7962"
},
{
"cve": "CVE-2026-7963",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7963"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in ServiceWorker in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7963",
"url": "https://www.suse.com/security/cve/CVE-2026-7963"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7963",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7963"
},
{
"cve": "CVE-2026-7964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7964"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in FileSystem in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7964",
"url": "https://www.suse.com/security/cve/CVE-2026-7964"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7964",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7964"
},
{
"cve": "CVE-2026-7965",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7965"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7965",
"url": "https://www.suse.com/security/cve/CVE-2026-7965"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7965",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7965"
},
{
"cve": "CVE-2026-7966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7966"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in SiteIsolation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7966",
"url": "https://www.suse.com/security/cve/CVE-2026-7966"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7966",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7966"
},
{
"cve": "CVE-2026-7967",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7967"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Navigation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7967",
"url": "https://www.suse.com/security/cve/CVE-2026-7967"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7967",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7967"
},
{
"cve": "CVE-2026-7968",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7968"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in CORS in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7968",
"url": "https://www.suse.com/security/cve/CVE-2026-7968"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7968",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7968"
},
{
"cve": "CVE-2026-7969",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7969"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in Network in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7969",
"url": "https://www.suse.com/security/cve/CVE-2026-7969"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7969",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7969"
},
{
"cve": "CVE-2026-7970",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7970"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in TopChrome in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7970",
"url": "https://www.suse.com/security/cve/CVE-2026-7970"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7970",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7970"
},
{
"cve": "CVE-2026-7971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7971"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in ORB in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to bypass site isolation via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7971",
"url": "https://www.suse.com/security/cve/CVE-2026-7971"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7971",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7971"
},
{
"cve": "CVE-2026-7972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7972"
}
],
"notes": [
{
"category": "general",
"text": "Uninitialized Use in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7972",
"url": "https://www.suse.com/security/cve/CVE-2026-7972"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7972",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7972"
},
{
"cve": "CVE-2026-7973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7973"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in Dawn in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7973",
"url": "https://www.suse.com/security/cve/CVE-2026-7973"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7973",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7973"
},
{
"cve": "CVE-2026-7974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7974"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7974",
"url": "https://www.suse.com/security/cve/CVE-2026-7974"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7974",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7974"
},
{
"cve": "CVE-2026-7975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7975"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7975",
"url": "https://www.suse.com/security/cve/CVE-2026-7975"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7975",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7975"
},
{
"cve": "CVE-2026-7976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7976"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Views in Google Chrome prior to 148.0.7778.96 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7976",
"url": "https://www.suse.com/security/cve/CVE-2026-7976"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7976",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7976"
},
{
"cve": "CVE-2026-7977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7977"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Canvas in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7977",
"url": "https://www.suse.com/security/cve/CVE-2026-7977"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7977",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7977"
},
{
"cve": "CVE-2026-7978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7978"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Companion in Google Chrome on Mac prior to 148.0.7778.96 allowed a remote attacker to perform OS-level privilege escalation via malicious network traffic. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7978",
"url": "https://www.suse.com/security/cve/CVE-2026-7978"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7978",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7978"
},
{
"cve": "CVE-2026-7979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7979"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Media in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7979",
"url": "https://www.suse.com/security/cve/CVE-2026-7979"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7979",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7979"
},
{
"cve": "CVE-2026-7980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7980"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebAudio in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7980",
"url": "https://www.suse.com/security/cve/CVE-2026-7980"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7980",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7980"
},
{
"cve": "CVE-2026-7981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7981"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Codecs in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to obtain potentially sensitive information from process memory via a malicious file. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7981",
"url": "https://www.suse.com/security/cve/CVE-2026-7981"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7981",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7981"
},
{
"cve": "CVE-2026-7982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7982"
}
],
"notes": [
{
"category": "general",
"text": "Uninitialized Use in WebCodecs in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7982",
"url": "https://www.suse.com/security/cve/CVE-2026-7982"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7982",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7982"
},
{
"cve": "CVE-2026-7983",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7983"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Dawn in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7983",
"url": "https://www.suse.com/security/cve/CVE-2026-7983"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7983",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7983"
},
{
"cve": "CVE-2026-7984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7984"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in ReadingMode in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7984",
"url": "https://www.suse.com/security/cve/CVE-2026-7984"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7984",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7984"
},
{
"cve": "CVE-2026-7985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7985"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in GPU in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7985",
"url": "https://www.suse.com/security/cve/CVE-2026-7985"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7985",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7985"
},
{
"cve": "CVE-2026-7986",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7986"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Autofill in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7986",
"url": "https://www.suse.com/security/cve/CVE-2026-7986"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7986",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7986"
},
{
"cve": "CVE-2026-7987",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7987"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7987",
"url": "https://www.suse.com/security/cve/CVE-2026-7987"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7987",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7987"
},
{
"cve": "CVE-2026-7988",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7988"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7988",
"url": "https://www.suse.com/security/cve/CVE-2026-7988"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7988",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7988"
},
{
"cve": "CVE-2026-7989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7989"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in DataTransfer in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7989",
"url": "https://www.suse.com/security/cve/CVE-2026-7989"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7989",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7989"
},
{
"cve": "CVE-2026-7990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7990"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Updater in Google Chrome on Windows prior to 148.0.7778.96 allowed a local attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7990",
"url": "https://www.suse.com/security/cve/CVE-2026-7990"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7990",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7990"
},
{
"cve": "CVE-2026-7991",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7991"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in UI in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7991",
"url": "https://www.suse.com/security/cve/CVE-2026-7991"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7991",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7991"
},
{
"cve": "CVE-2026-7992",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7992"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in UI in Google Chrome on Linux, ChromeOS prior to 148.0.7778.96 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7992",
"url": "https://www.suse.com/security/cve/CVE-2026-7992"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7992",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7992"
},
{
"cve": "CVE-2026-7993",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7993"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Payments in Google Chrome on Android prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7993",
"url": "https://www.suse.com/security/cve/CVE-2026-7993"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7993",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7993"
},
{
"cve": "CVE-2026-7994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7994"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Chromoting in Google Chrome on Windows prior to 148.0.7778.96 allowed a local attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7994",
"url": "https://www.suse.com/security/cve/CVE-2026-7994"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7994",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7994"
},
{
"cve": "CVE-2026-7995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7995"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in AdFilter in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7995",
"url": "https://www.suse.com/security/cve/CVE-2026-7995"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7995",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7995"
},
{
"cve": "CVE-2026-7996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7996"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in SSL in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7996",
"url": "https://www.suse.com/security/cve/CVE-2026-7996"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7996",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7996"
},
{
"cve": "CVE-2026-7997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7997"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Updater in Google Chrome on Mac prior to 148.0.7778.96 allowed a local attacker to perform OS-level privilege escalation via a malicious file. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7997",
"url": "https://www.suse.com/security/cve/CVE-2026-7997"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7997",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7997"
},
{
"cve": "CVE-2026-7998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7998"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Dialog in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7998",
"url": "https://www.suse.com/security/cve/CVE-2026-7998"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7998",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7998"
},
{
"cve": "CVE-2026-7999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-7999"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in V8 in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-7999",
"url": "https://www.suse.com/security/cve/CVE-2026-7999"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-7999",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-7999"
},
{
"cve": "CVE-2026-8000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8000"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in ChromeDriver in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8000",
"url": "https://www.suse.com/security/cve/CVE-2026-8000"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8000",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8000"
},
{
"cve": "CVE-2026-8001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8001"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in Printing in Google Chrome on Linux, Mac, ChromeOS prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8001",
"url": "https://www.suse.com/security/cve/CVE-2026-8001"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8001",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8001"
},
{
"cve": "CVE-2026-8002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8002"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Audio in Google Chrome on Mac prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8002",
"url": "https://www.suse.com/security/cve/CVE-2026-8002"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8002",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8002"
},
{
"cve": "CVE-2026-8003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8003"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in TabGroups in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform UI spoofing via malicious network traffic. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8003",
"url": "https://www.suse.com/security/cve/CVE-2026-8003"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8003",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8003"
},
{
"cve": "CVE-2026-8004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8004"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in DevTools in Google Chrome prior to 148.0.7778.96 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8004",
"url": "https://www.suse.com/security/cve/CVE-2026-8004"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8004",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8004"
},
{
"cve": "CVE-2026-8005",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8005"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Cast in Google Chrome prior to 148.0.7778.96 allowed an attacker on the local network segment to bypass same origin policy via malicious network traffic. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8005",
"url": "https://www.suse.com/security/cve/CVE-2026-8005"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8005",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8005"
},
{
"cve": "CVE-2026-8006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8006"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in DevTools in Google Chrome prior to 148.0.7778.96 allowed an attacker who convinced a user to install a malicious extension to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8006",
"url": "https://www.suse.com/security/cve/CVE-2026-8006"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8006",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8006"
},
{
"cve": "CVE-2026-8007",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8007"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Cast in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8007",
"url": "https://www.suse.com/security/cve/CVE-2026-8007"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8007",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8007"
},
{
"cve": "CVE-2026-8008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8008"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in DevTools in Google Chrome prior to 148.0.7778.96 allowed an attacker who convinced a user to install a malicious extension to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8008",
"url": "https://www.suse.com/security/cve/CVE-2026-8008"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8008",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8008"
},
{
"cve": "CVE-2026-8009",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8009"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Cast in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8009",
"url": "https://www.suse.com/security/cve/CVE-2026-8009"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8009",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8009"
},
{
"cve": "CVE-2026-8010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8010"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in SiteIsolation in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8010",
"url": "https://www.suse.com/security/cve/CVE-2026-8010"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8010",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8010"
},
{
"cve": "CVE-2026-8011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8011"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Search in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8011",
"url": "https://www.suse.com/security/cve/CVE-2026-8011"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8011",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8011"
},
{
"cve": "CVE-2026-8012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8012"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in MHTML in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8012",
"url": "https://www.suse.com/security/cve/CVE-2026-8012"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8012",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8012"
},
{
"cve": "CVE-2026-8013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8013"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in FedCM in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8013",
"url": "https://www.suse.com/security/cve/CVE-2026-8013"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8013",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8013"
},
{
"cve": "CVE-2026-8014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8014"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Preload in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8014",
"url": "https://www.suse.com/security/cve/CVE-2026-8014"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8014",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8014"
},
{
"cve": "CVE-2026-8015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8015"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Media in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8015",
"url": "https://www.suse.com/security/cve/CVE-2026-8015"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8015",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8015"
},
{
"cve": "CVE-2026-8016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8016"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebRTC in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8016",
"url": "https://www.suse.com/security/cve/CVE-2026-8016"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8016",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8016"
},
{
"cve": "CVE-2026-8017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8017"
}
],
"notes": [
{
"category": "general",
"text": "Side-channel information leakage in Media in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8017",
"url": "https://www.suse.com/security/cve/CVE-2026-8017"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8017",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8017"
},
{
"cve": "CVE-2026-8018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8018"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in DevTools in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to potentially perform a sandbox escape via malicious network traffic. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8018",
"url": "https://www.suse.com/security/cve/CVE-2026-8018"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8018",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8018"
},
{
"cve": "CVE-2026-8019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8019"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in WebApp in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8019",
"url": "https://www.suse.com/security/cve/CVE-2026-8019"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8019",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8019"
},
{
"cve": "CVE-2026-8020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8020"
}
],
"notes": [
{
"category": "general",
"text": "Uninitialized Use in GPU in Google Chrome on Android prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8020",
"url": "https://www.suse.com/security/cve/CVE-2026-8020"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8020",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8020"
},
{
"cve": "CVE-2026-8021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8021"
}
],
"notes": [
{
"category": "general",
"text": "Script injection in UI in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who convinced a user to engage in specific UI gestures to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8021",
"url": "https://www.suse.com/security/cve/CVE-2026-8021"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8021",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8021"
},
{
"cve": "CVE-2026-8022",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-8022"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in MHTML in Google Chrome prior to 148.0.7778.96 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted MHTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-8022",
"url": "https://www.suse.com/security/cve/CVE-2026-8022"
},
{
"category": "external",
"summary": "SUSE Bug 1264175 for CVE-2026-8022",
"url": "https://bugzilla.suse.com/1264175"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-148.0.7778.167-1.1.x86_64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.aarch64",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.s390x",
"openSUSE Tumbleweed:chromium-148.0.7778.167-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-14T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-8022"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…