[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-OPENSUSE-SU-2021:1350-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":64,"duplicates":65,"related":66,"reserved_at":9,"published_at":92,"modified_at":93,"state":9,"summary":94,"references_raw":96,"kevs":221,"epss":9,"epss_history":222,"metrics":223,"affected":224},"OPENSUSE-SU-2021:1350-1","Security update for chromium\n\nThis update for chromium fixes the following issues:\n\nChromium 94.0.4606.81 (boo#1191463):\n\n* CVE-2021-37977: Use after free in Garbage Collection\n* CVE-2021-37978: Heap buffer overflow in Blink\n* CVE-2021-37979: Heap buffer overflow in WebRTC\n* CVE-2021-37980: Inappropriate implementation in Sandbox\n\nChromium 94.0.4606.54 (boo#1190765):\n\n* CVE-2021-37956: Use after free in Offline use\n* CVE-2021-37957: Use after free in WebGPU\n* CVE-2021-37958: Inappropriate implementation in Navigation\n* CVE-2021-37959: Use after free in Task Manager\n* CVE-2021-37960: Inappropriate implementation in Blink graphics\n* CVE-2021-37961: Use after free in Tab Strip\n* CVE-2021-37962: Use after free in Performance Manager\n* CVE-2021-37963: Side-channel information leakage in DevTools\n* CVE-2021-37964: Inappropriate implementation in ChromeOS Networking\n* CVE-2021-37965: Inappropriate implementation in Background Fetch API\n* CVE-2021-37966: Inappropriate implementation in Compositing\n* CVE-2021-37967: Inappropriate implementation in Background Fetch API\n* CVE-2021-37968: Inappropriate implementation in Background Fetch API\n* CVE-2021-37969: Inappropriate implementation in Google Updater\n* CVE-2021-37970: Use after free in File System API\n* CVE-2021-37971: Incorrect security UI in Web Browser UI\n* CVE-2021-37972: Out of bounds read in libjpeg-turbo\n\nChromium 94.0.4606.61 (boo#1191166):\n\n* CVE-2021-37973: Use after free in Portals\n\nChromium 94.0.4606.71 (boo#1191204):\n\n* CVE-2021-37974 : Use after free in Safe Browsing\n* CVE-2021-37975 : Use after free in V8\n* CVE-2021-37976 : Information leak in core\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48,50,52,54,56,58,60,62],{"_key":15},"CVE-2021-37956",{"_key":17},"CVE-2021-37957",{"_key":19},"CVE-2021-37958",{"_key":21},"CVE-2021-37959",{"_key":23},"CVE-2021-37960",{"_key":25},"CVE-2021-37961",{"_key":27},"CVE-2021-37962",{"_key":29},"CVE-2021-37963",{"_key":31},"CVE-2021-37964",{"_key":33},"CVE-2021-37965",{"_key":35},"CVE-2021-37966",{"_key":37},"CVE-2021-37967",{"_key":39},"CVE-2021-37968",{"_key":41},"CVE-2021-37969",{"_key":43},"CVE-2021-37970",{"_key":45},"CVE-2021-37971",{"_key":47},"CVE-2021-37972",{"_key":49},"CVE-2021-37973",{"_key":51},"CVE-2021-37974",{"_key":53},"CVE-2021-37975",{"_key":55},"CVE-2021-37976",{"_key":57},"CVE-2021-37977",{"_key":59},"CVE-2021-37978",{"_key":61},"CVE-2021-37979",{"_key":63},"CVE-2021-37980",[],[],[67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},{"_key":43},{"_key":45},{"_key":47},{"_key":49},{"_key":51},{"_key":53},{"_key":55},{"_key":57},{"_key":59},{"_key":61},{"_key":63},"2021-10-12T10:39:31Z","2026-02-04T04:21:22.125095Z",{"cisa_kev":95,"cisa_ransomware":95,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[97,103,108,112,116,120,125,129,133,137,141,145,149,153,157,161,165,169,173,177,181,185,189,193,197,201,205,209,213,217],{"url":98,"sources":99,"tags":101},"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGCILKKE7TLKATFOFTDHZ573UHODPDOM/",[100],"osv_opensuse",[102],"Advisory",{"url":104,"sources":105,"tags":106},"https://bugzilla.suse.com/1190765",[100],[107],"REPORT",{"url":109,"sources":110,"tags":111},"https://bugzilla.suse.com/1191166",[100],[107],{"url":113,"sources":114,"tags":115},"https://bugzilla.suse.com/1191204",[100],[107],{"url":117,"sources":118,"tags":119},"https://bugzilla.suse.com/1191463",[100],[107],{"url":121,"sources":122,"tags":123},"https://www.suse.com/security/cve/CVE-2021-37956",[100],[124],"WEB",{"url":126,"sources":127,"tags":128},"https://www.suse.com/security/cve/CVE-2021-37957",[100],[124],{"url":130,"sources":131,"tags":132},"https://www.suse.com/security/cve/CVE-2021-37958",[100],[124],{"url":134,"sources":135,"tags":136},"https://www.suse.com/security/cve/CVE-2021-37959",[100],[124],{"url":138,"sources":139,"tags":140},"https://www.suse.com/security/cve/CVE-2021-37960",[100],[124],{"url":142,"sources":143,"tags":144},"https://www.suse.com/security/cve/CVE-2021-37961",[100],[124],{"url":146,"sources":147,"tags":148},"https://www.suse.com/security/cve/CVE-2021-37962",[100],[124],{"url":150,"sources":151,"tags":152},"https://www.suse.com/security/cve/CVE-2021-37963",[100],[124],{"url":154,"sources":155,"tags":156},"https://www.suse.com/security/cve/CVE-2021-37964",[100],[124],{"url":158,"sources":159,"tags":160},"https://www.suse.com/security/cve/CVE-2021-37965",[100],[124],{"url":162,"sources":163,"tags":164},"https://www.suse.com/security/cve/CVE-2021-37966",[100],[124],{"url":166,"sources":167,"tags":168},"https://www.suse.com/security/cve/CVE-2021-37967",[100],[124],{"url":170,"sources":171,"tags":172},"https://www.suse.com/security/cve/CVE-2021-37968",[100],[124],{"url":174,"sources":175,"tags":176},"https://www.suse.com/security/cve/CVE-2021-37969",[100],[124],{"url":178,"sources":179,"tags":180},"https://www.suse.com/security/cve/CVE-2021-37970",[100],[124],{"url":182,"sources":183,"tags":184},"https://www.suse.com/security/cve/CVE-2021-37971",[100],[124],{"url":186,"sources":187,"tags":188},"https://www.suse.com/security/cve/CVE-2021-37972",[100],[124],{"url":190,"sources":191,"tags":192},"https://www.suse.com/security/cve/CVE-2021-37973",[100],[124],{"url":194,"sources":195,"tags":196},"https://www.suse.com/security/cve/CVE-2021-37974",[100],[124],{"url":198,"sources":199,"tags":200},"https://www.suse.com/security/cve/CVE-2021-37975",[100],[124],{"url":202,"sources":203,"tags":204},"https://www.suse.com/security/cve/CVE-2021-37976",[100],[124],{"url":206,"sources":207,"tags":208},"https://www.suse.com/security/cve/CVE-2021-37977",[100],[124],{"url":210,"sources":211,"tags":212},"https://www.suse.com/security/cve/CVE-2021-37978",[100],[124],{"url":214,"sources":215,"tags":216},"https://www.suse.com/security/cve/CVE-2021-37979",[100],[124],{"url":218,"sources":219,"tags":220},"https://www.suse.com/security/cve/CVE-2021-37980",[100],[124],[],[],[],[225],{"ecosystem":226,"name":227,"vendor":228,"product":229,"cpe_part":9,"purl_type":230,"purl_namespace":228,"purl_name":229,"source":9,"versions":231},"openSUSE","chromium","opensuse","chromium&distro=openSUSE Leap 15.2","rpm",[232],{"version":233,"is_range":234,"range_type":235,"version_start":9,"version_start_type":9,"version_end":236,"version_end_type":237,"fixed_in":9},"lt94_0_4606_81_lp152_2_132_1",true,"ecosystem","94.0.4606.81-lp152.2.132.1","excluding"]