<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libQt5Pdf5-5.15.8-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11745-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libQt5Pdf5-5.15.8-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libQt5Pdf5-5.15.8-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11745</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3517/</URL>
      <Description>SUSE CVE CVE-2021-3517 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3541/</URL>
      <Description>SUSE CVE CVE-2021-3541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37984/</URL>
      <Description>SUSE CVE CVE-2021-37984 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37987/</URL>
      <Description>SUSE CVE CVE-2021-37987 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37989/</URL>
      <Description>SUSE CVE CVE-2021-37989 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37992/</URL>
      <Description>SUSE CVE CVE-2021-37992 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37993/</URL>
      <Description>SUSE CVE CVE-2021-37993 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-37996/</URL>
      <Description>SUSE CVE CVE-2021-37996 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38001/</URL>
      <Description>SUSE CVE CVE-2021-38001 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38003/</URL>
      <Description>SUSE CVE CVE-2021-38003 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38005/</URL>
      <Description>SUSE CVE CVE-2021-38005 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38007/</URL>
      <Description>SUSE CVE CVE-2021-38007 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38009/</URL>
      <Description>SUSE CVE CVE-2021-38009 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38010/</URL>
      <Description>SUSE CVE CVE-2021-38010 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38012/</URL>
      <Description>SUSE CVE CVE-2021-38012 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38015/</URL>
      <Description>SUSE CVE CVE-2021-38015 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38017/</URL>
      <Description>SUSE CVE CVE-2021-38017 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38018/</URL>
      <Description>SUSE CVE CVE-2021-38018 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38019/</URL>
      <Description>SUSE CVE CVE-2021-38019 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38021/</URL>
      <Description>SUSE CVE CVE-2021-38021 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38022/</URL>
      <Description>SUSE CVE CVE-2021-38022 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4057/</URL>
      <Description>SUSE CVE CVE-2021-4057 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4058/</URL>
      <Description>SUSE CVE CVE-2021-4058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4059/</URL>
      <Description>SUSE CVE CVE-2021-4059 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4062/</URL>
      <Description>SUSE CVE CVE-2021-4062 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4078/</URL>
      <Description>SUSE CVE CVE-2021-4078 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4079/</URL>
      <Description>SUSE CVE CVE-2021-4079 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4098/</URL>
      <Description>SUSE CVE CVE-2021-4098 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4099/</URL>
      <Description>SUSE CVE CVE-2021-4099 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4101/</URL>
      <Description>SUSE CVE CVE-2021-4101 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-4102/</URL>
      <Description>SUSE CVE CVE-2021-4102 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libQt5Pdf5-5.15.8-1.1">
      <FullProductName ProductID="libQt5Pdf5-5.15.8-1.1">libQt5Pdf5-5.15.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libQt5PdfWidgets5-5.15.8-1.1">
      <FullProductName ProductID="libQt5PdfWidgets5-5.15.8-1.1">libQt5PdfWidgets5-5.15.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtpdf-devel-5.15.8-1.1">
      <FullProductName ProductID="libqt5-qtpdf-devel-5.15.8-1.1">libqt5-qtpdf-devel-5.15.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtpdf-examples-5.15.8-1.1">
      <FullProductName ProductID="libqt5-qtpdf-examples-5.15.8-1.1">libqt5-qtpdf-examples-5.15.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtpdf-imports-5.15.8-1.1">
      <FullProductName ProductID="libqt5-qtpdf-imports-5.15.8-1.1">libqt5-qtpdf-imports-5.15.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtpdf-private-headers-devel-5.15.8-1.1">
      <FullProductName ProductID="libqt5-qtpdf-private-headers-devel-5.15.8-1.1">libqt5-qtpdf-private-headers-devel-5.15.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtwebengine-5.15.8-1.1">
      <FullProductName ProductID="libqt5-qtwebengine-5.15.8-1.1">libqt5-qtwebengine-5.15.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtwebengine-devel-5.15.8-1.1">
      <FullProductName ProductID="libqt5-qtwebengine-devel-5.15.8-1.1">libqt5-qtwebengine-devel-5.15.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtwebengine-examples-5.15.8-1.1">
      <FullProductName ProductID="libqt5-qtwebengine-examples-5.15.8-1.1">libqt5-qtwebengine-examples-5.15.8-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtwebengine-private-headers-devel-5.15.8-1.1">
      <FullProductName ProductID="libqt5-qtwebengine-private-headers-devel-5.15.8-1.1">libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libQt5Pdf5-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1">libQt5Pdf5-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libQt5PdfWidgets5-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1">libQt5PdfWidgets5-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtpdf-devel-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1">libqt5-qtpdf-devel-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtpdf-examples-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1">libqt5-qtpdf-examples-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtpdf-imports-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1">libqt5-qtpdf-imports-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtpdf-private-headers-devel-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1">libqt5-qtpdf-private-headers-devel-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtwebengine-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1">libqt5-qtwebengine-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtwebengine-devel-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1">libqt5-qtwebengine-devel-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtwebengine-examples-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1">libqt5-qtwebengine-examples-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtwebengine-private-headers-devel-5.15.8-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1">libqt5-qtwebengine-private-headers-devel-5.15.8-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.</Note>
    </Notes>
    <CVE>CVE-2021-3517</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3517.html</URL>
        <Description>CVE-2021-3517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185410</URL>
        <Description>SUSE Bug 1185410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194438</URL>
        <Description>SUSE Bug 1194438</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196383</URL>
        <Description>SUSE Bug 1196383</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.</Note>
    </Notes>
    <CVE>CVE-2021-3541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3541.html</URL>
        <Description>CVE-2021-3541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186015</URL>
        <Description>SUSE Bug 1186015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-37984</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37984.html</URL>
        <Description>CVE-2021-37984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191844</URL>
        <Description>SUSE Bug 1191844</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-37987</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37987.html</URL>
        <Description>CVE-2021-37987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191844</URL>
        <Description>SUSE Bug 1191844</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-37989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37989.html</URL>
        <Description>CVE-2021-37989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191844</URL>
        <Description>SUSE Bug 1191844</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-37992</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37992.html</URL>
        <Description>CVE-2021-37992</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191844</URL>
        <Description>SUSE Bug 1191844</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-37993</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37993.html</URL>
        <Description>CVE-2021-37993</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191844</URL>
        <Description>SUSE Bug 1191844</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file.</Note>
    </Notes>
    <CVE>CVE-2021-37996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-37996.html</URL>
        <Description>CVE-2021-37996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191844</URL>
        <Description>SUSE Bug 1191844</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38001</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38001.html</URL>
        <Description>CVE-2021-38001</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192184</URL>
        <Description>SUSE Bug 1192184</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38003</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38003.html</URL>
        <Description>CVE-2021-38003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192184</URL>
        <Description>SUSE Bug 1192184</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38005</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38005.html</URL>
        <Description>CVE-2021-38005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38007</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38007.html</URL>
        <Description>CVE-2021-38007</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38009</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38009.html</URL>
        <Description>CVE-2021-38009</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38010.html</URL>
        <Description>CVE-2021-38010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38012</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38012.html</URL>
        <Description>CVE-2021-38012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.</Note>
    </Notes>
    <CVE>CVE-2021-38015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38015.html</URL>
        <Description>CVE-2021-38015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38017.html</URL>
        <Description>CVE-2021-38017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in navigation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to perform domain spoofing via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38018</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38018.html</URL>
        <Description>CVE-2021-38018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38019</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38019.html</URL>
        <Description>CVE-2021-38019</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38021</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38021.html</URL>
        <Description>CVE-2021-38021</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-38022</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38022.html</URL>
        <Description>CVE-2021-38022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1192734</URL>
        <Description>SUSE Bug 1192734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-4057</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4057.html</URL>
        <Description>CVE-2021-4057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193519</URL>
        <Description>SUSE Bug 1193519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-4058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4058.html</URL>
        <Description>CVE-2021-4058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193519</URL>
        <Description>SUSE Bug 1193519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-4059</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4059.html</URL>
        <Description>CVE-2021-4059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193519</URL>
        <Description>SUSE Bug 1193519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-4062</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4062.html</URL>
        <Description>CVE-2021-4062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193519</URL>
        <Description>SUSE Bug 1193519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-4078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4078.html</URL>
        <Description>CVE-2021-4078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193519</URL>
        <Description>SUSE Bug 1193519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets.</Note>
    </Notes>
    <CVE>CVE-2021-4079</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4079.html</URL>
        <Description>CVE-2021-4079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193519</URL>
        <Description>SUSE Bug 1193519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-4098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4098.html</URL>
        <Description>CVE-2021-4098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193713</URL>
        <Description>SUSE Bug 1193713</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-4099</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4099.html</URL>
        <Description>CVE-2021-4099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193713</URL>
        <Description>SUSE Bug 1193713</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-4101</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4101.html</URL>
        <Description>CVE-2021-4101</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193713</URL>
        <Description>SUSE Bug 1193713</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2021-4102</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.8-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.8-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-4102.html</URL>
        <Description>CVE-2021-4102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193713</URL>
        <Description>SUSE Bug 1193713</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
