{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for chromium","title":"Title of the patch"},{"category":"description","text":"This update for chromium fixes the following issues:\n\nChanges in chromium:\n\n- Chromium 146.0.7680.80:\n\t  * CVE-2026-3909: Out of bounds write in Skia (boo#1259659)\n\n- Chromium 146.0.7680.75 (released 2026-03-12) (boo#1259648)\n  * CVE-2026-3910: Inappropriate implementation in V8.\n\n- Chromium 146.0.7680.71 (released 2026-03-11) (boo#1259530)\n  * CVE-2026-3913: Heap buffer overflow in WebML\n  * CVE-2026-3914: Integer overflow in WebML\n  * CVE-2026-3915: Heap buffer overflow in WebML\n  * CVE-2026-3916: Out of bounds read in Web Speech\n  * CVE-2026-3917: Use after free in Agents\n  * CVE-2026-3918: Use after free in WebMCP\n  * CVE-2026-3919: Use after free in Extensions\n  * CVE-2026-3920: Out of bounds memory access in WebML\n  * CVE-2026-3921: Use after free in TextEncoding\n  * CVE-2026-3922: Use after free in MediaStream\n  * CVE-2026-3923: Use after free in WebMIDI\n  * CVE-2026-3924: Use after free in WindowDialog\n  * CVE-2026-3925: Incorrect security UI in LookalikeChecks\n  * CVE-2026-3926: Out of bounds read in V8\n  * CVE-2026-3927: Incorrect security UI in PictureInPicture\n  * CVE-2026-3928: Insufficient policy enforcement in Extensions\n  * CVE-2026-3929: Side-channel information leakage in ResourceTiming\n  * CVE-2026-3930: Unsafe navigation in Navigation\n  * CVE-2026-3931: Heap buffer overflow in Skia\n  * CVE-2026-3932: Insufficient policy enforcement in PDF\n  * CVE-2026-3934: Insufficient policy enforcement in ChromeDriver\n  * CVE-2026-3935: Incorrect security UI in WebAppInstalls\n  * CVE-2026-3936: Use after free in WebView\n  * CVE-2026-3937: Incorrect security UI in Downloads\n  * CVE-2026-3938: Insufficient policy enforcement in Clipboard\n  * CVE-2026-3939: Insufficient policy enforcement in PDF\n  * CVE-2026-3940: Insufficient policy enforcement in DevTools\n  * CVE-2026-3941: Insufficient policy enforcement in DevTools\n  * CVE-2026-3942: Incorrect security UI in PictureInPicture\n","title":"Description of the patch"},{"category":"details","text":"openSUSE-Leap-16.0-packagehub-165","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20372-1.json"},{"category":"self","summary":"SUSE Bug 1259530","url":"https://bugzilla.suse.com/1259530"},{"category":"self","summary":"SUSE Bug 1259648","url":"https://bugzilla.suse.com/1259648"},{"category":"self","summary":"SUSE Bug 1259659","url":"https://bugzilla.suse.com/1259659"},{"category":"self","summary":"SUSE CVE CVE-2026-3909 page","url":"https://www.suse.com/security/cve/CVE-2026-3909/"},{"category":"self","summary":"SUSE CVE CVE-2026-3910 page","url":"https://www.suse.com/security/cve/CVE-2026-3910/"},{"category":"self","summary":"SUSE CVE CVE-2026-3913 page","url":"https://www.suse.com/security/cve/CVE-2026-3913/"},{"category":"self","summary":"SUSE CVE CVE-2026-3914 page","url":"https://www.suse.com/security/cve/CVE-2026-3914/"},{"category":"self","summary":"SUSE CVE CVE-2026-3915 page","url":"https://www.suse.com/security/cve/CVE-2026-3915/"},{"category":"self","summary":"SUSE CVE CVE-2026-3916 page","url":"https://www.suse.com/security/cve/CVE-2026-3916/"},{"category":"self","summary":"SUSE CVE CVE-2026-3917 page","url":"https://www.suse.com/security/cve/CVE-2026-3917/"},{"category":"self","summary":"SUSE CVE CVE-2026-3918 page","url":"https://www.suse.com/security/cve/CVE-2026-3918/"},{"category":"self","summary":"SUSE CVE CVE-2026-3919 page","url":"https://www.suse.com/security/cve/CVE-2026-3919/"},{"category":"self","summary":"SUSE CVE CVE-2026-3920 page","url":"https://www.suse.com/security/cve/CVE-2026-3920/"},{"category":"self","summary":"SUSE CVE CVE-2026-3921 page","url":"https://www.suse.com/security/cve/CVE-2026-3921/"},{"category":"self","summary":"SUSE CVE CVE-2026-3922 page","url":"https://www.suse.com/security/cve/CVE-2026-3922/"},{"category":"self","summary":"SUSE CVE CVE-2026-3923 page","url":"https://www.suse.com/security/cve/CVE-2026-3923/"},{"category":"self","summary":"SUSE CVE CVE-2026-3924 page","url":"https://www.suse.com/security/cve/CVE-2026-3924/"},{"category":"self","summary":"SUSE CVE CVE-2026-3925 page","url":"https://www.suse.com/security/cve/CVE-2026-3925/"},{"category":"self","summary":"SUSE CVE CVE-2026-3926 page","url":"https://www.suse.com/security/cve/CVE-2026-3926/"},{"category":"self","summary":"SUSE CVE CVE-2026-3927 page","url":"https://www.suse.com/security/cve/CVE-2026-3927/"},{"category":"self","summary":"SUSE CVE CVE-2026-3928 page","url":"https://www.suse.com/security/cve/CVE-2026-3928/"},{"category":"self","summary":"SUSE CVE CVE-2026-3929 page","url":"https://www.suse.com/security/cve/CVE-2026-3929/"},{"category":"self","summary":"SUSE CVE CVE-2026-3930 page","url":"https://www.suse.com/security/cve/CVE-2026-3930/"},{"category":"self","summary":"SUSE CVE CVE-2026-3931 page","url":"https://www.suse.com/security/cve/CVE-2026-3931/"},{"category":"self","summary":"SUSE CVE CVE-2026-3932 page","url":"https://www.suse.com/security/cve/CVE-2026-3932/"},{"category":"self","summary":"SUSE CVE CVE-2026-3934 page","url":"https://www.suse.com/security/cve/CVE-2026-3934/"},{"category":"self","summary":"SUSE CVE CVE-2026-3935 page","url":"https://www.suse.com/security/cve/CVE-2026-3935/"},{"category":"self","summary":"SUSE CVE CVE-2026-3936 page","url":"https://www.suse.com/security/cve/CVE-2026-3936/"},{"category":"self","summary":"SUSE CVE CVE-2026-3937 page","url":"https://www.suse.com/security/cve/CVE-2026-3937/"},{"category":"self","summary":"SUSE CVE CVE-2026-3938 page","url":"https://www.suse.com/security/cve/CVE-2026-3938/"},{"category":"self","summary":"SUSE CVE CVE-2026-3939 page","url":"https://www.suse.com/security/cve/CVE-2026-3939/"},{"category":"self","summary":"SUSE CVE CVE-2026-3940 page","url":"https://www.suse.com/security/cve/CVE-2026-3940/"},{"category":"self","summary":"SUSE CVE CVE-2026-3941 page","url":"https://www.suse.com/security/cve/CVE-2026-3941/"},{"category":"self","summary":"SUSE CVE CVE-2026-3942 page","url":"https://www.suse.com/security/cve/CVE-2026-3942/"}],"title":"Security update for chromium","tracking":{"current_release_date":"2026-03-17T10:11:02Z","generator":{"date":"2026-03-17T10:11:02Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2026:20372-1","initial_release_date":"2026-03-17T10:11:02Z","revision_history":[{"date":"2026-03-17T10:11:02Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"chromedriver-146.0.7680.80-bp160.1.1.aarch64","product":{"name":"chromedriver-146.0.7680.80-bp160.1.1.aarch64","product_id":"chromedriver-146.0.7680.80-bp160.1.1.aarch64"}},{"category":"product_version","name":"chromium-146.0.7680.80-bp160.1.1.aarch64","product":{"name":"chromium-146.0.7680.80-bp160.1.1.aarch64","product_id":"chromium-146.0.7680.80-bp160.1.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"chromedriver-146.0.7680.80-bp160.1.1.ppc64le","product":{"name":"chromedriver-146.0.7680.80-bp160.1.1.ppc64le","product_id":"chromedriver-146.0.7680.80-bp160.1.1.ppc64le"}},{"category":"product_version","name":"chromium-146.0.7680.80-bp160.1.1.ppc64le","product":{"name":"chromium-146.0.7680.80-bp160.1.1.ppc64le","product_id":"chromium-146.0.7680.80-bp160.1.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"chromedriver-146.0.7680.80-bp160.1.1.x86_64","product":{"name":"chromedriver-146.0.7680.80-bp160.1.1.x86_64","product_id":"chromedriver-146.0.7680.80-bp160.1.1.x86_64"}},{"category":"product_version","name":"chromium-146.0.7680.80-bp160.1.1.x86_64","product":{"name":"chromium-146.0.7680.80-bp160.1.1.x86_64","product_id":"chromium-146.0.7680.80-bp160.1.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Leap 16.0","product":{"name":"openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0"}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"chromedriver-146.0.7680.80-bp160.1.1.aarch64 as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64"},"product_reference":"chromedriver-146.0.7680.80-bp160.1.1.aarch64","relates_to_product_reference":"openSUSE Leap 16.0"},{"category":"default_component_of","full_product_name":{"name":"chromedriver-146.0.7680.80-bp160.1.1.ppc64le as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le"},"product_reference":"chromedriver-146.0.7680.80-bp160.1.1.ppc64le","relates_to_product_reference":"openSUSE Leap 16.0"},{"category":"default_component_of","full_product_name":{"name":"chromedriver-146.0.7680.80-bp160.1.1.x86_64 as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64"},"product_reference":"chromedriver-146.0.7680.80-bp160.1.1.x86_64","relates_to_product_reference":"openSUSE Leap 16.0"},{"category":"default_component_of","full_product_name":{"name":"chromium-146.0.7680.80-bp160.1.1.aarch64 as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64"},"product_reference":"chromium-146.0.7680.80-bp160.1.1.aarch64","relates_to_product_reference":"openSUSE Leap 16.0"},{"category":"default_component_of","full_product_name":{"name":"chromium-146.0.7680.80-bp160.1.1.ppc64le as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le"},"product_reference":"chromium-146.0.7680.80-bp160.1.1.ppc64le","relates_to_product_reference":"openSUSE Leap 16.0"},{"category":"default_component_of","full_product_name":{"name":"chromium-146.0.7680.80-bp160.1.1.x86_64 as component of openSUSE Leap 16.0","product_id":"openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"},"product_reference":"chromium-146.0.7680.80-bp160.1.1.x86_64","relates_to_product_reference":"openSUSE Leap 16.0"}]},"vulnerabilities":[{"cve":"CVE-2026-3909","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3909"}],"notes":[{"category":"general","text":"Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3909","url":"https://www.suse.com/security/cve/CVE-2026-3909"},{"category":"external","summary":"SUSE Bug 1259648 for CVE-2026-3909","url":"https://bugzilla.suse.com/1259648"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"important"}],"title":"CVE-2026-3909"},{"cve":"CVE-2026-3910","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3910"}],"notes":[{"category":"general","text":"Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3910","url":"https://www.suse.com/security/cve/CVE-2026-3910"},{"category":"external","summary":"SUSE Bug 1259648 for CVE-2026-3910","url":"https://bugzilla.suse.com/1259648"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"important"}],"title":"CVE-2026-3910"},{"cve":"CVE-2026-3913","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3913"}],"notes":[{"category":"general","text":"Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3913","url":"https://www.suse.com/security/cve/CVE-2026-3913"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3913","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3913"},{"cve":"CVE-2026-3914","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3914"}],"notes":[{"category":"general","text":"Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3914","url":"https://www.suse.com/security/cve/CVE-2026-3914"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3914","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3914"},{"cve":"CVE-2026-3915","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3915"}],"notes":[{"category":"general","text":"Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3915","url":"https://www.suse.com/security/cve/CVE-2026-3915"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3915","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3915"},{"cve":"CVE-2026-3916","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3916"}],"notes":[{"category":"general","text":"Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3916","url":"https://www.suse.com/security/cve/CVE-2026-3916"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3916","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3916"},{"cve":"CVE-2026-3917","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3917"}],"notes":[{"category":"general","text":"Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3917","url":"https://www.suse.com/security/cve/CVE-2026-3917"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3917","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3917"},{"cve":"CVE-2026-3918","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3918"}],"notes":[{"category":"general","text":"Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3918","url":"https://www.suse.com/security/cve/CVE-2026-3918"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3918","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3918"},{"cve":"CVE-2026-3919","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3919"}],"notes":[{"category":"general","text":"Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3919","url":"https://www.suse.com/security/cve/CVE-2026-3919"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3919","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3919"},{"cve":"CVE-2026-3920","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3920"}],"notes":[{"category":"general","text":"Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3920","url":"https://www.suse.com/security/cve/CVE-2026-3920"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3920","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3920"},{"cve":"CVE-2026-3921","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3921"}],"notes":[{"category":"general","text":"Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3921","url":"https://www.suse.com/security/cve/CVE-2026-3921"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3921","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3921"},{"cve":"CVE-2026-3922","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3922"}],"notes":[{"category":"general","text":"Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3922","url":"https://www.suse.com/security/cve/CVE-2026-3922"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3922","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3922"},{"cve":"CVE-2026-3923","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3923"}],"notes":[{"category":"general","text":"Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3923","url":"https://www.suse.com/security/cve/CVE-2026-3923"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3923","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3923"},{"cve":"CVE-2026-3924","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3924"}],"notes":[{"category":"general","text":"use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3924","url":"https://www.suse.com/security/cve/CVE-2026-3924"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3924","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3924"},{"cve":"CVE-2026-3925","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3925"}],"notes":[{"category":"general","text":"Incorrect security UI in LookalikeChecks in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3925","url":"https://www.suse.com/security/cve/CVE-2026-3925"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3925","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3925"},{"cve":"CVE-2026-3926","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3926"}],"notes":[{"category":"general","text":"Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3926","url":"https://www.suse.com/security/cve/CVE-2026-3926"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3926","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3926"},{"cve":"CVE-2026-3927","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3927"}],"notes":[{"category":"general","text":"Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3927","url":"https://www.suse.com/security/cve/CVE-2026-3927"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3927","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3927"},{"cve":"CVE-2026-3928","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3928"}],"notes":[{"category":"general","text":"Insufficient policy enforcement in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3928","url":"https://www.suse.com/security/cve/CVE-2026-3928"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3928","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3928"},{"cve":"CVE-2026-3929","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3929"}],"notes":[{"category":"general","text":"Side-channel information leakage in ResourceTiming in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3929","url":"https://www.suse.com/security/cve/CVE-2026-3929"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3929","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3929"},{"cve":"CVE-2026-3930","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3930"}],"notes":[{"category":"general","text":"Unsafe navigation in Navigation in Google Chrome on iOS prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3930","url":"https://www.suse.com/security/cve/CVE-2026-3930"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3930","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3930"},{"cve":"CVE-2026-3931","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3931"}],"notes":[{"category":"general","text":"Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3931","url":"https://www.suse.com/security/cve/CVE-2026-3931"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3931","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3931"},{"cve":"CVE-2026-3932","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3932"}],"notes":[{"category":"general","text":"Insufficient policy enforcement in PDF in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3932","url":"https://www.suse.com/security/cve/CVE-2026-3932"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3932","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3932"},{"cve":"CVE-2026-3934","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3934"}],"notes":[{"category":"general","text":"Insufficient policy enforcement in ChromeDriver in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3934","url":"https://www.suse.com/security/cve/CVE-2026-3934"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3934","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3934"},{"cve":"CVE-2026-3935","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3935"}],"notes":[{"category":"general","text":"Incorrect security UI in WebAppInstalls in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3935","url":"https://www.suse.com/security/cve/CVE-2026-3935"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3935","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3935"},{"cve":"CVE-2026-3936","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3936"}],"notes":[{"category":"general","text":"Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3936","url":"https://www.suse.com/security/cve/CVE-2026-3936"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3936","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3936"},{"cve":"CVE-2026-3937","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3937"}],"notes":[{"category":"general","text":"Incorrect security UI in Downloads in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3937","url":"https://www.suse.com/security/cve/CVE-2026-3937"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3937","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3937"},{"cve":"CVE-2026-3938","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3938"}],"notes":[{"category":"general","text":"Insufficient policy enforcement in Clipboard in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3938","url":"https://www.suse.com/security/cve/CVE-2026-3938"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3938","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3938"},{"cve":"CVE-2026-3939","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3939"}],"notes":[{"category":"general","text":"Insufficient policy enforcement in PDF in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted PDF file. (Chromium security severity: Low)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3939","url":"https://www.suse.com/security/cve/CVE-2026-3939"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3939","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3939"},{"cve":"CVE-2026-3940","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3940"}],"notes":[{"category":"general","text":"Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3940","url":"https://www.suse.com/security/cve/CVE-2026-3940"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3940","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","version":"3.1"},"products":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3940"},{"cve":"CVE-2026-3941","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3941"}],"notes":[{"category":"general","text":"Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3941","url":"https://www.suse.com/security/cve/CVE-2026-3941"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3941","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3941"},{"cve":"CVE-2026-3942","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2026-3942"}],"notes":[{"category":"general","text":"Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)","title":"CVE description"}],"product_status":{"recommended":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2026-3942","url":"https://www.suse.com/security/cve/CVE-2026-3942"},{"category":"external","summary":"SUSE Bug 1259530 for CVE-2026-3942","url":"https://bugzilla.suse.com/1259530"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromedriver-146.0.7680.80-bp160.1.1.x86_64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.aarch64","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.ppc64le","openSUSE Leap 16.0:chromium-146.0.7680.80-bp160.1.1.x86_64"]}],"threats":[{"category":"impact","date":"2026-03-17T10:11:02Z","details":"critical"}],"title":"CVE-2026-3942"}]}