[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-OPENSUSE-SU-2026:20460-1":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-22T16:08:08.064Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":56,"duplicates":57,"related":58,"reserved_at":9,"published_at":80,"modified_at":81,"state":9,"summary":82,"references_raw":84,"kevs":176,"epss":9,"epss_history":177,"metrics":178,"affected":179},"OPENSUSE-SU-2026:20460-1","Security update for chromium\n\nThis update for chromium fixes the following issues:\n\nChanges in chromium:\n\n- Chromium 146.0.7680.177 (boo#1261249)\n  * CVE-2026-5273: Use after free in CSS\n  * CVE-2026-5272: Heap buffer overflow in GPU\n  * CVE-2026-5274: Integer overflow in Codecs\n  * CVE-2026-5275: Heap buffer overflow in ANGLE\n  * CVE-2026-5276: Insufficient policy enforcement in WebUSB\n  * CVE-2026-5277: Integer overflow in ANGLE\n  * CVE-2026-5278: Use after free in Web MIDI\n  * CVE-2026-5279: Object corruption in V8\n  * CVE-2026-5280: Use after free in WebCodecs\n  * CVE-2026-5281: Use after free in Dawn\n  * CVE-2026-5282: Out of bounds read in WebCodecs\n  * CVE-2026-5283: Inappropriate implementation in ANGLE\n  * CVE-2026-5284: Use after free in Dawn\n  * CVE-2026-5285: Use after free in WebGL\n  * CVE-2026-5286: Use after free in Dawn\n  * CVE-2026-5287: Use after free in PDF\n  * CVE-2026-5288: Use after free in WebView\n  * CVE-2026-5289: Use after free in Navigation\n  * CVE-2026-5290: Use after free in Compositing\n  * CVE-2026-5291: Inappropriate implementation in WebGL\n  * CVE-2026-5292: Out of bounds read in WebCodecs\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48,50,52,54],{"_key":15},"CVE-2026-5272",{"_key":17},"CVE-2026-5273",{"_key":19},"CVE-2026-5274",{"_key":21},"CVE-2026-5275",{"_key":23},"CVE-2026-5276",{"_key":25},"CVE-2026-5277",{"_key":27},"CVE-2026-5278",{"_key":29},"CVE-2026-5279",{"_key":31},"CVE-2026-5280",{"_key":33},"CVE-2026-5281",{"_key":35},"CVE-2026-5282",{"_key":37},"CVE-2026-5283",{"_key":39},"CVE-2026-5284",{"_key":41},"CVE-2026-5285",{"_key":43},"CVE-2026-5286",{"_key":45},"CVE-2026-5287",{"_key":47},"CVE-2026-5288",{"_key":49},"CVE-2026-5289",{"_key":51},"CVE-2026-5290",{"_key":53},"CVE-2026-5291",{"_key":55},"CVE-2026-5292",[],[],[59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},{"_key":43},{"_key":45},{"_key":47},{"_key":49},{"_key":51},{"_key":53},{"_key":55},"2026-04-03T06:09:23Z","2026-04-05T10:33:31.750135Z",{"cisa_kev":83,"cisa_ransomware":83,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[85,91,96,100,104,108,112,116,120,124,128,132,136,140,144,148,152,156,160,164,168,172],{"url":86,"sources":87,"tags":89},"https://bugzilla.suse.com/1261249",[88],"osv_opensuse",[90],"REPORT",{"url":92,"sources":93,"tags":94},"https://www.suse.com/security/cve/CVE-2026-5272",[88],[95],"WEB",{"url":97,"sources":98,"tags":99},"https://www.suse.com/security/cve/CVE-2026-5273",[88],[95],{"url":101,"sources":102,"tags":103},"https://www.suse.com/security/cve/CVE-2026-5274",[88],[95],{"url":105,"sources":106,"tags":107},"https://www.suse.com/security/cve/CVE-2026-5275",[88],[95],{"url":109,"sources":110,"tags":111},"https://www.suse.com/security/cve/CVE-2026-5276",[88],[95],{"url":113,"sources":114,"tags":115},"https://www.suse.com/security/cve/CVE-2026-5277",[88],[95],{"url":117,"sources":118,"tags":119},"https://www.suse.com/security/cve/CVE-2026-5278",[88],[95],{"url":121,"sources":122,"tags":123},"https://www.suse.com/security/cve/CVE-2026-5279",[88],[95],{"url":125,"sources":126,"tags":127},"https://www.suse.com/security/cve/CVE-2026-5280",[88],[95],{"url":129,"sources":130,"tags":131},"https://www.suse.com/security/cve/CVE-2026-5281",[88],[95],{"url":133,"sources":134,"tags":135},"https://www.suse.com/security/cve/CVE-2026-5282",[88],[95],{"url":137,"sources":138,"tags":139},"https://www.suse.com/security/cve/CVE-2026-5283",[88],[95],{"url":141,"sources":142,"tags":143},"https://www.suse.com/security/cve/CVE-2026-5284",[88],[95],{"url":145,"sources":146,"tags":147},"https://www.suse.com/security/cve/CVE-2026-5285",[88],[95],{"url":149,"sources":150,"tags":151},"https://www.suse.com/security/cve/CVE-2026-5286",[88],[95],{"url":153,"sources":154,"tags":155},"https://www.suse.com/security/cve/CVE-2026-5287",[88],[95],{"url":157,"sources":158,"tags":159},"https://www.suse.com/security/cve/CVE-2026-5288",[88],[95],{"url":161,"sources":162,"tags":163},"https://www.suse.com/security/cve/CVE-2026-5289",[88],[95],{"url":165,"sources":166,"tags":167},"https://www.suse.com/security/cve/CVE-2026-5290",[88],[95],{"url":169,"sources":170,"tags":171},"https://www.suse.com/security/cve/CVE-2026-5291",[88],[95],{"url":173,"sources":174,"tags":175},"https://www.suse.com/security/cve/CVE-2026-5292",[88],[95],[],[],[],[180],{"ecosystem":181,"name":182,"vendor":183,"product":184,"cpe_part":9,"purl_type":185,"purl_namespace":183,"purl_name":184,"source":9,"versions":186},"openSUSE","chromium","opensuse","chromium&distro=openSUSE Leap 16.0","rpm",[187],{"version":188,"is_range":189,"range_type":190,"version_start":9,"version_start_type":9,"version_end":191,"version_end_type":192,"fixed_in":9},"lt146_0_7680_177_bp160_1_1",true,"ecosystem","146.0.7680.177-bp160.1.1","excluding"]