opensuse-su-2019:1436-1
Vulnerability from csaf_opensuse
Published
2019-05-22 16:41
Modified
2019-05-22 16:41
Summary
Security update for chromium

Notes

Title of the patch
Security update for chromium
Description of the patch
This update for chromium fixes the following issues: Chromium was updated to 74.0.3729.108 boo#1133313: * CVE-2019-5805: Use after free in PDFium * CVE-2019-5806: Integer overflow in Angle * CVE-2019-5807: Memory corruption in V8 * CVE-2019-5808: Use after free in Blink * CVE-2019-5809: Use after free in Blink * CVE-2019-5810: User information disclosure in Autofill * CVE-2019-5811: CORS bypass in Blink * CVE-2019-5813: Out of bounds read in V8 * CVE-2019-5814: CORS bypass in Blink * CVE-2019-5815: Heap buffer overflow in Blink * CVE-2019-5818: Uninitialized value in media reader * CVE-2019-5819: Incorrect escaping in developer tools * CVE-2019-5820: Integer overflow in PDFium * CVE-2019-5821: Integer overflow in PDFium * CVE-2019-5822: CORS bypass in download manager * CVE-2019-5823: Forced navigation from service worker * CVE-2019-5812: URL spoof in Omnibox on iOS * CVE-2019-5816: Exploit persistence extension on Android * CVE-2019-5817: Heap buffer overflow in Angle on Windows - Update conditions to use system harfbuzz on TW+ - Require java during build - Enable using pipewire when available This update was imported from the openSUSE:Leap:15.0:Update update project.
Patchnames
openSUSE-2019-1436
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for chromium",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for chromium fixes the following issues:\n\nChromium was updated to 74.0.3729.108 boo#1133313:\n\n* CVE-2019-5805: Use after free in PDFium\n* CVE-2019-5806: Integer overflow in Angle\n* CVE-2019-5807: Memory corruption in V8\n* CVE-2019-5808: Use after free in Blink\n* CVE-2019-5809: Use after free in Blink\n* CVE-2019-5810: User information disclosure in Autofill\n* CVE-2019-5811: CORS bypass in Blink\n* CVE-2019-5813: Out of bounds read in V8\n* CVE-2019-5814: CORS bypass in Blink\n* CVE-2019-5815: Heap buffer overflow in Blink\n* CVE-2019-5818: Uninitialized value in media reader\n* CVE-2019-5819: Incorrect escaping in developer tools\n* CVE-2019-5820: Integer overflow in PDFium\n* CVE-2019-5821: Integer overflow in PDFium\n* CVE-2019-5822: CORS bypass in download manager\n* CVE-2019-5823: Forced navigation from service worker\n* CVE-2019-5812: URL spoof in Omnibox on iOS\n* CVE-2019-5816: Exploit persistence extension on Android\n* CVE-2019-5817: Heap buffer overflow in Angle on Windows\n\n- Update conditions to use system harfbuzz on TW+\n- Require java during build\n- Enable using pipewire when available\n\nThis update was imported from the openSUSE:Leap:15.0:Update update project.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-2019-1436",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1436-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2019:1436-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AWRISTZJJNJJPLDT4TNSJKAHMVL6J2RA/#AWRISTZJJNJJPLDT4TNSJKAHMVL6J2RA"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2019:1436-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AWRISTZJJNJJPLDT4TNSJKAHMVL6J2RA/#AWRISTZJJNJJPLDT4TNSJKAHMVL6J2RA"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133313",
        "url": "https://bugzilla.suse.com/1133313"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5805 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5805/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5806 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5806/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5807 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5807/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5808 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5808/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5809 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5809/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5810 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5810/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5811 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5811/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5812 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5812/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5813 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5813/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5814 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5814/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5815 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5815/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5816 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5816/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5817 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5817/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5818 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5818/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5819 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5819/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5820 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5820/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5821 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5821/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5822 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5822/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-5823 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-5823/"
      }
    ],
    "title": "Security update for chromium",
    "tracking": {
      "current_release_date": "2019-05-22T16:41:14Z",
      "generator": {
        "date": "2019-05-22T16:41:14Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2019:1436-1",
      "initial_release_date": "2019-05-22T16:41:14Z",
      "revision_history": [
        {
          "date": "2019-05-22T16:41:14Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "chromedriver-74.0.3729.108-bp150.207.1.x86_64",
                "product": {
                  "name": "chromedriver-74.0.3729.108-bp150.207.1.x86_64",
                  "product_id": "chromedriver-74.0.3729.108-bp150.207.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "chromium-74.0.3729.108-bp150.207.1.x86_64",
                "product": {
                  "name": "chromium-74.0.3729.108-bp150.207.1.x86_64",
                  "product_id": "chromium-74.0.3729.108-bp150.207.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Package Hub 15",
                "product": {
                  "name": "SUSE Package Hub 15",
                  "product_id": "SUSE Package Hub 15"
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromedriver-74.0.3729.108-bp150.207.1.x86_64 as component of SUSE Package Hub 15",
          "product_id": "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64"
        },
        "product_reference": "chromedriver-74.0.3729.108-bp150.207.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 15"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "chromium-74.0.3729.108-bp150.207.1.x86_64 as component of SUSE Package Hub 15",
          "product_id": "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        },
        "product_reference": "chromium-74.0.3729.108-bp150.207.1.x86_64",
        "relates_to_product_reference": "SUSE Package Hub 15"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-5805",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5805"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5805",
          "url": "https://www.suse.com/security/cve/CVE-2019-5805"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5805",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5805"
    },
    {
      "cve": "CVE-2019-5806",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5806"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5806",
          "url": "https://www.suse.com/security/cve/CVE-2019-5806"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5806",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5806"
    },
    {
      "cve": "CVE-2019-5807",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5807"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Object lifetime issue in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5807",
          "url": "https://www.suse.com/security/cve/CVE-2019-5807"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5807",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5807"
    },
    {
      "cve": "CVE-2019-5808",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5808"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5808",
          "url": "https://www.suse.com/security/cve/CVE-2019-5808"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5808",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5808"
    },
    {
      "cve": "CVE-2019-5809",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5809"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5809",
          "url": "https://www.suse.com/security/cve/CVE-2019-5809"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5809",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5809"
    },
    {
      "cve": "CVE-2019-5810",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5810"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Information leak in autofill in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5810",
          "url": "https://www.suse.com/security/cve/CVE-2019-5810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5810",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-5810"
    },
    {
      "cve": "CVE-2019-5811",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5811"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5811",
          "url": "https://www.suse.com/security/cve/CVE-2019-5811"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5811",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5811"
    },
    {
      "cve": "CVE-2019-5812",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5812"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inadequate security UI in iOS UI in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to perform domain spoofing via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5812",
          "url": "https://www.suse.com/security/cve/CVE-2019-5812"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5812",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-5812"
    },
    {
      "cve": "CVE-2019-5813",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5813"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Use after free in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5813",
          "url": "https://www.suse.com/security/cve/CVE-2019-5813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5813",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5813"
    },
    {
      "cve": "CVE-2019-5814",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5814"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient policy enforcement in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5814",
          "url": "https://www.suse.com/security/cve/CVE-2019-5814"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5814",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-5814"
    },
    {
      "cve": "CVE-2019-5815",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5815"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Type confusion in xsltNumberFormatGetMultipleLevel prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5815",
          "url": "https://www.suse.com/security/cve/CVE-2019-5815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5815",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5815"
    },
    {
      "cve": "CVE-2019-5816",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5816"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Process lifetime issue in Chrome in Google Chrome on Android prior to 74.0.3729.108 allowed a remote attacker to potentially persist an exploited process via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5816",
          "url": "https://www.suse.com/security/cve/CVE-2019-5816"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5816",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5816"
    },
    {
      "cve": "CVE-2019-5817",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5817"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5817",
          "url": "https://www.suse.com/security/cve/CVE-2019-5817"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5817",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5817"
    },
    {
      "cve": "CVE-2019-5818",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5818"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Uninitialized data in media in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5818",
          "url": "https://www.suse.com/security/cve/CVE-2019-5818"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5818",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-5818"
    },
    {
      "cve": "CVE-2019-5819",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5819"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5819",
          "url": "https://www.suse.com/security/cve/CVE-2019-5819"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5819",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5819"
    },
    {
      "cve": "CVE-2019-5820",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5820"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5820",
          "url": "https://www.suse.com/security/cve/CVE-2019-5820"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5820",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5820"
    },
    {
      "cve": "CVE-2019-5821",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5821"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5821",
          "url": "https://www.suse.com/security/cve/CVE-2019-5821"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5821",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5821"
    },
    {
      "cve": "CVE-2019-5822",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5822"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5822",
          "url": "https://www.suse.com/security/cve/CVE-2019-5822"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5822",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-5822"
    },
    {
      "cve": "CVE-2019-5823",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-5823"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Insufficient policy enforcement in service workers in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
          "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-5823",
          "url": "https://www.suse.com/security/cve/CVE-2019-5823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1133313 for CVE-2019-5823",
          "url": "https://bugzilla.suse.com/1133313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64",
            "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-05-22T16:41:14Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-5823"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…