Upstream information

CVE-2021-30628 at MITRE

Description

Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having critical severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 8.8
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1190476 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP3
  • chromedriver >= 93.0.4577.82-bp153.2.28.1
  • chromium >= 93.0.4577.82-bp153.2.28.1
  • nodejs-electron >= 16.0.9-bp153.2.1
  • nodejs-electron-devel >= 16.0.9-bp153.2.1
Patchnames:
openSUSE-2021-1300
openSUSE-2022-70
openSUSE Leap 15.2
  • chromedriver >= 93.0.4577.82-lp152.2.125.1
  • chromium >= 93.0.4577.82-lp152.2.125.1
Patchnames:
openSUSE-2021-1303
openSUSE Leap 15.2 NonFree
  • opera >= 79.0.4143.50-lp152.2.67.1
Patchnames:
openSUSE-2021-1330
openSUSE Leap 15.3
  • chromedriver >= 93.0.4577.82-bp153.2.28.1
  • chromium >= 93.0.4577.82-bp153.2.28.1
  • nodejs-electron >= 16.0.9-bp153.2.1
  • nodejs-electron-devel >= 16.0.9-bp153.2.1
Patchnames:
openSUSE-2021-1300
openSUSE-2022-70
openSUSE Leap 15.3 NonFree
  • opera >= 79.0.4143.50-lp153.2.21.1
Patchnames:
openSUSE-2021-1330
openSUSE Leap 15.4
  • chromium >= 101.0.4951.64-bp154.1.2
  • libqt5-qtwebengine >= 5.15.9-bp154.1.32
Patchnames:
openSUSE Leap 15.4 GA chromium-101.0.4951.64-bp154.1.2
openSUSE Leap 15.4 GA libqt5-qtwebengine-5.15.9-bp154.1.32
openSUSE Leap 15.4 NonFree
  • opera >= 85.0.4341.28-lp154.2.5.1
Patchnames:
openSUSE-2022-110
openSUSE Tumbleweed
  • chromedriver >= 93.0.4577.82-1.1
  • chromium >= 93.0.4577.82-1.1
  • libQt5Pdf5 >= 5.15.7-1.1
  • libQt5PdfWidgets5 >= 5.15.7-1.1
  • libqt5-qtpdf-devel >= 5.15.7-1.1
  • libqt5-qtpdf-examples >= 5.15.7-1.1
  • libqt5-qtpdf-imports >= 5.15.7-1.1
  • libqt5-qtpdf-private-headers-devel >= 5.15.7-1.1
  • libqt5-qtwebengine >= 5.15.7-1.1
  • libqt5-qtwebengine-devel >= 5.15.7-1.1
  • libqt5-qtwebengine-examples >= 5.15.7-1.1
  • libqt5-qtwebengine-private-headers-devel >= 5.15.7-1.1
  • nodejs-electron >= 13.5.0-1.1
  • ungoogled-chromium >= 113.0.5672.92-1.1
  • ungoogled-chromium-chromedriver >= 113.0.5672.92-1.1
Patchnames:
openSUSE-Tumbleweed-2024-10681
openSUSE-Tumbleweed-2024-11550
openSUSE-Tumbleweed-2024-11605
openSUSE-Tumbleweed-2024-12948


SUSE Timeline for this CVE

CVE page created: Tue Sep 14 13:16:03 2021
CVE page last modified: Tue Sep 3 19:20:26 2024