Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-5859 (GCVE-0-2026-5859)
Vulnerability from cvelistv5 – Published: 2026-04-08 21:20 – Updated: 2026-04-13 13:19- CWE-472 - Integer overflow
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-5859",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-10T03:55:37.781510Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T13:19:21.572Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "147.0.7727.55",
"status": "affected",
"version": "147.0.7727.55",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-472",
"description": "Integer overflow",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-08T21:20:39.849Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"url": "https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html"
},
{
"url": "https://issues.chromium.org/issues/494158331"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2026-5859",
"datePublished": "2026-04-08T21:20:39.849Z",
"dateReserved": "2026-04-08T19:34:31.788Z",
"dateUpdated": "2026-04-13T13:19:21.572Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-5859",
"date": "2026-04-14",
"epss": "0.0008",
"percentile": "0.23523"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-5859\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2026-04-08T22:16:25.383\",\"lastModified\":\"2026-04-13T17:23:57.670\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"chrome-cve-admin@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-472\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"147.0.7727.55\",\"matchCriteriaId\":\"9A68673A-1331-48AF-8860-53064F0AF310\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387021A0-AF36-463C-A605-32EA7DAC172E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://issues.chromium.org/issues/494158331\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Permissions Required\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-5859\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-10T03:55:37.781510Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-13T13:19:18.306Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Google\", \"product\": \"Chrome\", \"versions\": [{\"status\": \"affected\", \"version\": \"147.0.7727.55\", \"lessThan\": \"147.0.7727.55\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html\"}, {\"url\": \"https://issues.chromium.org/issues/494158331\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"cweId\": \"CWE-472\", \"description\": \"Integer overflow\"}]}], \"providerMetadata\": {\"orgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"shortName\": \"Chrome\", \"dateUpdated\": \"2026-04-08T21:20:39.849Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-5859\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-13T13:19:21.572Z\", \"dateReserved\": \"2026-04-08T19:34:31.788Z\", \"assignerOrgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"datePublished\": \"2026-04-08T21:20:39.849Z\", \"assignerShortName\": \"Chrome\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-5859
Vulnerability from fkie_nvd - Published: 2026-04-08 22:16 - Updated: 2026-04-13 17:23| URL | Tags | ||
|---|---|---|---|
| chrome-cve-admin@google.com | https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html | Release Notes, Vendor Advisory | |
| chrome-cve-admin@google.com | https://issues.chromium.org/issues/494158331 | Permissions Required |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A68673A-1331-48AF-8860-53064F0AF310",
"versionEndExcluding": "147.0.7727.55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)"
}
],
"id": "CVE-2026-5859",
"lastModified": "2026-04-13T17:23:57.670",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-04-08T22:16:25.383",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required"
],
"url": "https://issues.chromium.org/issues/494158331"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-472"
}
],
"source": "chrome-cve-admin@google.com",
"type": "Secondary"
}
]
}
GHSA-7GPJ-6VGG-G937
Vulnerability from github – Published: 2026-04-09 00:31 – Updated: 2026-04-13 15:31Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
{
"affected": [],
"aliases": [
"CVE-2026-5859"
],
"database_specific": {
"cwe_ids": [
"CWE-472"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-08T22:16:25Z",
"severity": "HIGH"
},
"details": "Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"id": "GHSA-7gpj-6vgg-g937",
"modified": "2026-04-13T15:31:10Z",
"published": "2026-04-09T00:31:59Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5859"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html"
},
{
"type": "WEB",
"url": "https://issues.chromium.org/issues/494158331"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2026:10530-1
Vulnerability from csaf_opensuse - Published: 2026-04-11 00:00 - Updated: 2026-04-11 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "chromedriver-147.0.7727.55-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the chromedriver-147.0.7727.55-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10530",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10530-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5858 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5859 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5860 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5861 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5862 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5863 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5864 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5865 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5866 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5866/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5867 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5868 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5869 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5870 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5871 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5871/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5872 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5873 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5874 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5875 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5876 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5877 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5877/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5878 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5879 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5880 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5881 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5882 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5883 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5883/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5884 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5885 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5886 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5887 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5888 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5888/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5889 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5889/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5890 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5890/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5891 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5891/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5892 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5892/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5893 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5894 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5894/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5895 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5896 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5897 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5898 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5899 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5899/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5900 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5901 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5902 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5903 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5904 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5905 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5906 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5907 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5908 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5909 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5910 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5911 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5912 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5913 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5913/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5914 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5914/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5915 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5915/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5918 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-5919 page",
"url": "https://www.suse.com/security/cve/CVE-2026-5919/"
}
],
"title": "chromedriver-147.0.7727.55-1.1 on GA media",
"tracking": {
"current_release_date": "2026-04-11T00:00:00Z",
"generator": {
"date": "2026-04-11T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10530-1",
"initial_release_date": "2026-04-11T00:00:00Z",
"revision_history": [
{
"date": "2026-04-11T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-147.0.7727.55-1.1.aarch64",
"product": {
"name": "chromedriver-147.0.7727.55-1.1.aarch64",
"product_id": "chromedriver-147.0.7727.55-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-147.0.7727.55-1.1.aarch64",
"product": {
"name": "chromium-147.0.7727.55-1.1.aarch64",
"product_id": "chromium-147.0.7727.55-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-147.0.7727.55-1.1.ppc64le",
"product": {
"name": "chromedriver-147.0.7727.55-1.1.ppc64le",
"product_id": "chromedriver-147.0.7727.55-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "chromium-147.0.7727.55-1.1.ppc64le",
"product": {
"name": "chromium-147.0.7727.55-1.1.ppc64le",
"product_id": "chromium-147.0.7727.55-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-147.0.7727.55-1.1.s390x",
"product": {
"name": "chromedriver-147.0.7727.55-1.1.s390x",
"product_id": "chromedriver-147.0.7727.55-1.1.s390x"
}
},
{
"category": "product_version",
"name": "chromium-147.0.7727.55-1.1.s390x",
"product": {
"name": "chromium-147.0.7727.55-1.1.s390x",
"product_id": "chromium-147.0.7727.55-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-147.0.7727.55-1.1.x86_64",
"product": {
"name": "chromedriver-147.0.7727.55-1.1.x86_64",
"product_id": "chromedriver-147.0.7727.55-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-147.0.7727.55-1.1.x86_64",
"product": {
"name": "chromium-147.0.7727.55-1.1.x86_64",
"product_id": "chromium-147.0.7727.55-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-147.0.7727.55-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64"
},
"product_reference": "chromedriver-147.0.7727.55-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-147.0.7727.55-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le"
},
"product_reference": "chromedriver-147.0.7727.55-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-147.0.7727.55-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x"
},
"product_reference": "chromedriver-147.0.7727.55-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-147.0.7727.55-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64"
},
"product_reference": "chromedriver-147.0.7727.55-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-147.0.7727.55-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64"
},
"product_reference": "chromium-147.0.7727.55-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-147.0.7727.55-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le"
},
"product_reference": "chromium-147.0.7727.55-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-147.0.7727.55-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x"
},
"product_reference": "chromium-147.0.7727.55-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-147.0.7727.55-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
},
"product_reference": "chromium-147.0.7727.55-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-5858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5858"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5858",
"url": "https://www.suse.com/security/cve/CVE-2026-5858"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5858",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5858"
},
{
"cve": "CVE-2026-5859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5859"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5859",
"url": "https://www.suse.com/security/cve/CVE-2026-5859"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5859",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5859"
},
{
"cve": "CVE-2026-5860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5860"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebRTC in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5860",
"url": "https://www.suse.com/security/cve/CVE-2026-5860"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5860",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5860"
},
{
"cve": "CVE-2026-5861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5861"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5861",
"url": "https://www.suse.com/security/cve/CVE-2026-5861"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5861",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5861"
},
{
"cve": "CVE-2026-5862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5862"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5862",
"url": "https://www.suse.com/security/cve/CVE-2026-5862"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5862",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5862"
},
{
"cve": "CVE-2026-5863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5863"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5863",
"url": "https://www.suse.com/security/cve/CVE-2026-5863"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5863",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5863"
},
{
"cve": "CVE-2026-5864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5864"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in WebAudio in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5864",
"url": "https://www.suse.com/security/cve/CVE-2026-5864"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5864",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5864"
},
{
"cve": "CVE-2026-5865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5865"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5865",
"url": "https://www.suse.com/security/cve/CVE-2026-5865"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5865",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5865"
},
{
"cve": "CVE-2026-5866",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5866"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5866",
"url": "https://www.suse.com/security/cve/CVE-2026-5866"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5866",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5866"
},
{
"cve": "CVE-2026-5867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5867"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5867",
"url": "https://www.suse.com/security/cve/CVE-2026-5867"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5867",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5867"
},
{
"cve": "CVE-2026-5868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5868"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5868",
"url": "https://www.suse.com/security/cve/CVE-2026-5868"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5868",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5868"
},
{
"cve": "CVE-2026-5869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5869"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5869",
"url": "https://www.suse.com/security/cve/CVE-2026-5869"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5869",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5869"
},
{
"cve": "CVE-2026-5870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5870"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in Skia in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5870",
"url": "https://www.suse.com/security/cve/CVE-2026-5870"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5870",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5870"
},
{
"cve": "CVE-2026-5871",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5871"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5871",
"url": "https://www.suse.com/security/cve/CVE-2026-5871"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5871",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5871"
},
{
"cve": "CVE-2026-5872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5872"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5872",
"url": "https://www.suse.com/security/cve/CVE-2026-5872"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5872",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5872"
},
{
"cve": "CVE-2026-5873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5873"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read and write in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5873",
"url": "https://www.suse.com/security/cve/CVE-2026-5873"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5873",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5873"
},
{
"cve": "CVE-2026-5874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5874"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PrivateAI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5874",
"url": "https://www.suse.com/security/cve/CVE-2026-5874"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5874",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5874"
},
{
"cve": "CVE-2026-5875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5875"
}
],
"notes": [
{
"category": "general",
"text": "Policy bypass in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5875",
"url": "https://www.suse.com/security/cve/CVE-2026-5875"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5875",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5875"
},
{
"cve": "CVE-2026-5876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5876"
}
],
"notes": [
{
"category": "general",
"text": "Side-channel information leakage in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5876",
"url": "https://www.suse.com/security/cve/CVE-2026-5876"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5876",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5876"
},
{
"cve": "CVE-2026-5877",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5877"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5877",
"url": "https://www.suse.com/security/cve/CVE-2026-5877"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5877",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5877"
},
{
"cve": "CVE-2026-5878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5878"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5878",
"url": "https://www.suse.com/security/cve/CVE-2026-5878"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5878",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5878"
},
{
"cve": "CVE-2026-5879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5879"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in ANGLE in Google Chrome on Mac prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5879",
"url": "https://www.suse.com/security/cve/CVE-2026-5879"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5879",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5879"
},
{
"cve": "CVE-2026-5880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5880"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5880",
"url": "https://www.suse.com/security/cve/CVE-2026-5880"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5880",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5880"
},
{
"cve": "CVE-2026-5881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5881"
}
],
"notes": [
{
"category": "general",
"text": "Policy bypass in LocalNetworkAccess in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5881",
"url": "https://www.suse.com/security/cve/CVE-2026-5881"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5881",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5881"
},
{
"cve": "CVE-2026-5882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5882"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Fullscreen in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5882",
"url": "https://www.suse.com/security/cve/CVE-2026-5882"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5882",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5882"
},
{
"cve": "CVE-2026-5883",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5883"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5883",
"url": "https://www.suse.com/security/cve/CVE-2026-5883"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5883",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5883"
},
{
"cve": "CVE-2026-5884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5884"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5884",
"url": "https://www.suse.com/security/cve/CVE-2026-5884"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5884",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5884"
},
{
"cve": "CVE-2026-5885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5885"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in WebML in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5885",
"url": "https://www.suse.com/security/cve/CVE-2026-5885"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5885",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5885"
},
{
"cve": "CVE-2026-5886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5886"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in WebAudio in Google Chrome on Mac prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5886",
"url": "https://www.suse.com/security/cve/CVE-2026-5886"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5886",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5886"
},
{
"cve": "CVE-2026-5887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5887"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Downloads in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to bypass download restrictions via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5887",
"url": "https://www.suse.com/security/cve/CVE-2026-5887"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5887",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5887"
},
{
"cve": "CVE-2026-5888",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5888"
}
],
"notes": [
{
"category": "general",
"text": "Uninitialized Use in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5888",
"url": "https://www.suse.com/security/cve/CVE-2026-5888"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5888",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5888"
},
{
"cve": "CVE-2026-5889",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5889"
}
],
"notes": [
{
"category": "general",
"text": "Cryptographic Flaw in PDFium in Google Chrome prior to 147.0.7727.55 allowed an attacker to read potentially sensitive information from encrypted PDFs via a brute-force attack. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5889",
"url": "https://www.suse.com/security/cve/CVE-2026-5889"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5889",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5889"
},
{
"cve": "CVE-2026-5890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5890"
}
],
"notes": [
{
"category": "general",
"text": "Race in WebCodecs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5890",
"url": "https://www.suse.com/security/cve/CVE-2026-5890"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5890",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5890"
},
{
"cve": "CVE-2026-5891",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5891"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in browser UI in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5891",
"url": "https://www.suse.com/security/cve/CVE-2026-5891"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5891",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5891"
},
{
"cve": "CVE-2026-5892",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5892"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in PWAs in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to install a PWA without user consent via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5892",
"url": "https://www.suse.com/security/cve/CVE-2026-5892"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5892",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5892"
},
{
"cve": "CVE-2026-5893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5893"
}
],
"notes": [
{
"category": "general",
"text": "Race in V8 in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5893",
"url": "https://www.suse.com/security/cve/CVE-2026-5893"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5893",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5893"
},
{
"cve": "CVE-2026-5894",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5894"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in PDF in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5894",
"url": "https://www.suse.com/security/cve/CVE-2026-5894"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5894",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5894"
},
{
"cve": "CVE-2026-5895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5895"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5895",
"url": "https://www.suse.com/security/cve/CVE-2026-5895"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5895",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5895"
},
{
"cve": "CVE-2026-5896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5896"
}
],
"notes": [
{
"category": "general",
"text": "Policy bypass in Audio in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass sandbox download restrictions via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5896",
"url": "https://www.suse.com/security/cve/CVE-2026-5896"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5896",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5896"
},
{
"cve": "CVE-2026-5897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5897"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Downloads in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5897",
"url": "https://www.suse.com/security/cve/CVE-2026-5897"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5897",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5897"
},
{
"cve": "CVE-2026-5898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5898"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Omnibox in Google Chrome on iOS prior to 147.0.7727.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5898",
"url": "https://www.suse.com/security/cve/CVE-2026-5898"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5898",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5898"
},
{
"cve": "CVE-2026-5899",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5899"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in History Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5899",
"url": "https://www.suse.com/security/cve/CVE-2026-5899"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5899",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5899"
},
{
"cve": "CVE-2026-5900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5900"
}
],
"notes": [
{
"category": "general",
"text": "Policy bypass in Downloads in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass of multi-download protections via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5900",
"url": "https://www.suse.com/security/cve/CVE-2026-5900"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5900",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5900"
},
{
"cve": "CVE-2026-5901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5901"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in DevTools in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to bypass enterprise host restrictions for cookie modification via a crafted Chrome Extension. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5901",
"url": "https://www.suse.com/security/cve/CVE-2026-5901"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5901",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5901"
},
{
"cve": "CVE-2026-5902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5902"
}
],
"notes": [
{
"category": "general",
"text": "Race in Media in Google Chrome on Android prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to corrupt media stream metadata via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5902",
"url": "https://www.suse.com/security/cve/CVE-2026-5902"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5902",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5902"
},
{
"cve": "CVE-2026-5903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5903"
}
],
"notes": [
{
"category": "general",
"text": "Policy bypass in IFrameSandbox in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5903",
"url": "https://www.suse.com/security/cve/CVE-2026-5903"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5903",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5903"
},
{
"cve": "CVE-2026-5904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5904"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5904",
"url": "https://www.suse.com/security/cve/CVE-2026-5904"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5904",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5904"
},
{
"cve": "CVE-2026-5905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5905"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Permissions in Google Chrome on Windows prior to 147.0.7727.55 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5905",
"url": "https://www.suse.com/security/cve/CVE-2026-5905"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5905",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5905"
},
{
"cve": "CVE-2026-5906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5906"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Omnibox in Google Chrome on Android prior to 147.0.7727.55 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5906",
"url": "https://www.suse.com/security/cve/CVE-2026-5906"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5906",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5906"
},
{
"cve": "CVE-2026-5907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5907"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory read via a crafted video file. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5907",
"url": "https://www.suse.com/security/cve/CVE-2026-5907"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5907",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5907"
},
{
"cve": "CVE-2026-5908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5908"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5908",
"url": "https://www.suse.com/security/cve/CVE-2026-5908"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5908",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5908"
},
{
"cve": "CVE-2026-5909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5909"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5909",
"url": "https://www.suse.com/security/cve/CVE-2026-5909"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5909",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5909"
},
{
"cve": "CVE-2026-5910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5910"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in Media in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to potentially exploit heap corruption via a crafted video file. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5910",
"url": "https://www.suse.com/security/cve/CVE-2026-5910"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5910",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-5910"
},
{
"cve": "CVE-2026-5911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5911"
}
],
"notes": [
{
"category": "general",
"text": "Policy bypass in ServiceWorkers in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5911",
"url": "https://www.suse.com/security/cve/CVE-2026-5911"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5911",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5911"
},
{
"cve": "CVE-2026-5912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5912"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in WebRTC in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5912",
"url": "https://www.suse.com/security/cve/CVE-2026-5912"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5912",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5912"
},
{
"cve": "CVE-2026-5913",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5913"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Blink in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5913",
"url": "https://www.suse.com/security/cve/CVE-2026-5913"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5913",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5913"
},
{
"cve": "CVE-2026-5914",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5914"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in CSS in Google Chrome prior to 147.0.7727.55 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5914",
"url": "https://www.suse.com/security/cve/CVE-2026-5914"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5914",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5914"
},
{
"cve": "CVE-2026-5915",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5915"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5915",
"url": "https://www.suse.com/security/cve/CVE-2026-5915"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5915",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5915"
},
{
"cve": "CVE-2026-5918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5918"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Navigation in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5918",
"url": "https://www.suse.com/security/cve/CVE-2026-5918"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5918",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2026-5918"
},
{
"cve": "CVE-2026-5919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-5919"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in WebSockets in Google Chrome prior to 147.0.7727.55 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page. (Chromium security severity: Low)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-5919",
"url": "https://www.suse.com/security/cve/CVE-2026-5919"
},
{
"category": "external",
"summary": "SUSE Bug 1261758 for CVE-2026-5919",
"url": "https://bugzilla.suse.com/1261758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromedriver-147.0.7727.55-1.1.x86_64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.aarch64",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.ppc64le",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.s390x",
"openSUSE Tumbleweed:chromium-147.0.7727.55-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-11T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-5919"
}
]
}
CERTFR-2026-AVI-0407
Vulnerability from certfr_avis - Published: 2026-04-09 - Updated: 2026-04-09
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Chrome versions ant\u00e9rieures \u00e0 147.0.7727.55/56 pour Windows et Mac",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
},
{
"description": "Chrome versions ant\u00e9rieures \u00e0 147.0.7727.55 pour Linux",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-5879",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5879"
},
{
"name": "CVE-2026-5872",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5872"
},
{
"name": "CVE-2026-5905",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5905"
},
{
"name": "CVE-2026-5902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5902"
},
{
"name": "CVE-2026-5875",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5875"
},
{
"name": "CVE-2026-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5914"
},
{
"name": "CVE-2026-5898",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5898"
},
{
"name": "CVE-2026-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5878"
},
{
"name": "CVE-2026-5899",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5899"
},
{
"name": "CVE-2026-5886",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5886"
},
{
"name": "CVE-2026-5877",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5877"
},
{
"name": "CVE-2026-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5918"
},
{
"name": "CVE-2026-5913",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5913"
},
{
"name": "CVE-2026-5867",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5867"
},
{
"name": "CVE-2026-5897",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5897"
},
{
"name": "CVE-2026-5876",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5876"
},
{
"name": "CVE-2026-5881",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5881"
},
{
"name": "CVE-2026-5880",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5880"
},
{
"name": "CVE-2026-5896",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5896"
},
{
"name": "CVE-2026-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5868"
},
{
"name": "CVE-2026-5903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5903"
},
{
"name": "CVE-2026-5882",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5882"
},
{
"name": "CVE-2026-5904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5904"
},
{
"name": "CVE-2026-5911",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5911"
},
{
"name": "CVE-2026-5871",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5871"
},
{
"name": "CVE-2026-5883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5883"
},
{
"name": "CVE-2026-5909",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5909"
},
{
"name": "CVE-2026-5895",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5895"
},
{
"name": "CVE-2026-5912",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5912"
},
{
"name": "CVE-2026-5894",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5894"
},
{
"name": "CVE-2026-5863",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5863"
},
{
"name": "CVE-2026-5893",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5893"
},
{
"name": "CVE-2026-5858",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5858"
},
{
"name": "CVE-2026-5908",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5908"
},
{
"name": "CVE-2026-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5869"
},
{
"name": "CVE-2026-5885",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5885"
},
{
"name": "CVE-2026-5864",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5864"
},
{
"name": "CVE-2026-5861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5861"
},
{
"name": "CVE-2026-5874",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5874"
},
{
"name": "CVE-2026-5919",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5919"
},
{
"name": "CVE-2026-5906",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5906"
},
{
"name": "CVE-2026-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5889"
},
{
"name": "CVE-2026-5887",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5887"
},
{
"name": "CVE-2026-5860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5860"
},
{
"name": "CVE-2026-5900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5900"
},
{
"name": "CVE-2026-5888",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5888"
},
{
"name": "CVE-2026-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5870"
},
{
"name": "CVE-2026-5884",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5884"
},
{
"name": "CVE-2026-5891",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5891"
},
{
"name": "CVE-2026-5866",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5866"
},
{
"name": "CVE-2026-5865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5865"
},
{
"name": "CVE-2026-5907",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5907"
},
{
"name": "CVE-2026-5892",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5892"
},
{
"name": "CVE-2026-5859",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5859"
},
{
"name": "CVE-2026-5910",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5910"
},
{
"name": "CVE-2026-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5915"
},
{
"name": "CVE-2026-5873",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5873"
},
{
"name": "CVE-2026-5890",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5890"
},
{
"name": "CVE-2026-5862",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5862"
},
{
"name": "CVE-2026-5901",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5901"
}
],
"initial_release_date": "2026-04-09T00:00:00",
"last_revision_date": "2026-04-09T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0407",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": "2026-04-07",
"title": "Bulletin de s\u00e9curit\u00e9 Google Chrome",
"url": "https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2026-AVI-0427
Vulnerability from certfr_avis - Published: 2026-04-13 - Updated: 2026-04-13
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge pour Android versions ant\u00e9rieures \u00e0 147.0.3912.60",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 147.0.3912.60",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-5879",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5879"
},
{
"name": "CVE-2026-5872",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5872"
},
{
"name": "CVE-2026-5905",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5905"
},
{
"name": "CVE-2026-5902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5902"
},
{
"name": "CVE-2026-5875",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5875"
},
{
"name": "CVE-2026-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5914"
},
{
"name": "CVE-2026-5898",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5898"
},
{
"name": "CVE-2026-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5878"
},
{
"name": "CVE-2026-5899",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5899"
},
{
"name": "CVE-2026-5886",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5886"
},
{
"name": "CVE-2026-5877",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5877"
},
{
"name": "CVE-2026-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5918"
},
{
"name": "CVE-2026-5913",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5913"
},
{
"name": "CVE-2026-5867",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5867"
},
{
"name": "CVE-2026-5897",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5897"
},
{
"name": "CVE-2026-5876",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5876"
},
{
"name": "CVE-2026-5881",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5881"
},
{
"name": "CVE-2026-5880",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5880"
},
{
"name": "CVE-2026-5896",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5896"
},
{
"name": "CVE-2026-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5868"
},
{
"name": "CVE-2026-5903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5903"
},
{
"name": "CVE-2026-5882",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5882"
},
{
"name": "CVE-2026-5904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5904"
},
{
"name": "CVE-2026-5911",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5911"
},
{
"name": "CVE-2026-5871",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5871"
},
{
"name": "CVE-2026-5883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5883"
},
{
"name": "CVE-2026-5909",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5909"
},
{
"name": "CVE-2026-5895",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5895"
},
{
"name": "CVE-2026-5912",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5912"
},
{
"name": "CVE-2026-5894",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5894"
},
{
"name": "CVE-2026-33118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33118"
},
{
"name": "CVE-2026-5863",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5863"
},
{
"name": "CVE-2026-5893",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5893"
},
{
"name": "CVE-2026-5858",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5858"
},
{
"name": "CVE-2026-5908",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5908"
},
{
"name": "CVE-2026-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5869"
},
{
"name": "CVE-2026-5885",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5885"
},
{
"name": "CVE-2026-5864",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5864"
},
{
"name": "CVE-2026-5861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5861"
},
{
"name": "CVE-2026-5874",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5874"
},
{
"name": "CVE-2026-5919",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5919"
},
{
"name": "CVE-2026-5906",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5906"
},
{
"name": "CVE-2026-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5889"
},
{
"name": "CVE-2026-5887",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5887"
},
{
"name": "CVE-2026-5860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5860"
},
{
"name": "CVE-2026-5900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5900"
},
{
"name": "CVE-2026-5888",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5888"
},
{
"name": "CVE-2026-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5870"
},
{
"name": "CVE-2026-5884",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5884"
},
{
"name": "CVE-2026-5891",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5891"
},
{
"name": "CVE-2026-5866",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5866"
},
{
"name": "CVE-2026-5865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5865"
},
{
"name": "CVE-2026-5907",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5907"
},
{
"name": "CVE-2026-33119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33119"
},
{
"name": "CVE-2026-5892",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5892"
},
{
"name": "CVE-2026-5859",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5859"
},
{
"name": "CVE-2026-5910",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5910"
},
{
"name": "CVE-2026-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5915"
},
{
"name": "CVE-2026-5873",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5873"
},
{
"name": "CVE-2026-5890",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5890"
},
{
"name": "CVE-2026-5862",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5862"
},
{
"name": "CVE-2026-5901",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5901"
}
],
"initial_release_date": "2026-04-13T00:00:00",
"last_revision_date": "2026-04-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0427",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge. Elles permettent \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9 et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5879",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5879"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5884",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5884"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5889",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5889"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5909",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5909"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5860",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5860"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5867",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5867"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5880",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5880"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5895",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5895"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5911",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5911"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5859",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5859"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5904",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5904"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5914",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5914"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5873",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5873"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5896",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5896"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5893",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5893"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5888",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5888"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5900",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5900"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5882",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5882"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5881",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5881"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5885",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5885"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5918",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5918"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5877",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5877"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5897",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5897"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5905",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5905"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5865",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5865"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5864",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5864"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5891",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5891"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5868",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5868"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5890",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5890"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5902",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5902"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5861",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5861"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5872",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5872"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5898",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5898"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5875",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5875"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5899",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5899"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5876",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5876"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-33119",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33119"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5869",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5869"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5878",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5878"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5871",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5871"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5892",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5892"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5874",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5874"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5887",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5887"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5886",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5886"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5862",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5862"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5907",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5907"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5858",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5858"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5901",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5901"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5915",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5915"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5883",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5883"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-33118",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33118"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5903",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5903"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5913",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5913"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5894",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5894"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5919",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5919"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5908",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5908"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5866",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5866"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5906",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5906"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5863",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5863"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5870",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5870"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5912",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5912"
},
{
"published_at": "2026-04-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2026-5910",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5910"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.