opensuse-su-2019:1436-1
Vulnerability from csaf_opensuse
Published
2019-05-22 16:41
Modified
2019-05-22 16:41
Summary
Security update for chromium
Notes
Title of the patch
Security update for chromium
Description of the patch
This update for chromium fixes the following issues:
Chromium was updated to 74.0.3729.108 boo#1133313:
* CVE-2019-5805: Use after free in PDFium
* CVE-2019-5806: Integer overflow in Angle
* CVE-2019-5807: Memory corruption in V8
* CVE-2019-5808: Use after free in Blink
* CVE-2019-5809: Use after free in Blink
* CVE-2019-5810: User information disclosure in Autofill
* CVE-2019-5811: CORS bypass in Blink
* CVE-2019-5813: Out of bounds read in V8
* CVE-2019-5814: CORS bypass in Blink
* CVE-2019-5815: Heap buffer overflow in Blink
* CVE-2019-5818: Uninitialized value in media reader
* CVE-2019-5819: Incorrect escaping in developer tools
* CVE-2019-5820: Integer overflow in PDFium
* CVE-2019-5821: Integer overflow in PDFium
* CVE-2019-5822: CORS bypass in download manager
* CVE-2019-5823: Forced navigation from service worker
* CVE-2019-5812: URL spoof in Omnibox on iOS
* CVE-2019-5816: Exploit persistence extension on Android
* CVE-2019-5817: Heap buffer overflow in Angle on Windows
- Update conditions to use system harfbuzz on TW+
- Require java during build
- Enable using pipewire when available
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patchnames
openSUSE-2019-1436
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for chromium", "title": "Title of the patch" }, { "category": "description", "text": "This update for chromium fixes the following issues:\n\nChromium was updated to 74.0.3729.108 boo#1133313:\n\n* CVE-2019-5805: Use after free in PDFium\n* CVE-2019-5806: Integer overflow in Angle\n* CVE-2019-5807: Memory corruption in V8\n* CVE-2019-5808: Use after free in Blink\n* CVE-2019-5809: Use after free in Blink\n* CVE-2019-5810: User information disclosure in Autofill\n* CVE-2019-5811: CORS bypass in Blink\n* CVE-2019-5813: Out of bounds read in V8\n* CVE-2019-5814: CORS bypass in Blink\n* CVE-2019-5815: Heap buffer overflow in Blink\n* CVE-2019-5818: Uninitialized value in media reader\n* CVE-2019-5819: Incorrect escaping in developer tools\n* CVE-2019-5820: Integer overflow in PDFium\n* CVE-2019-5821: Integer overflow in PDFium\n* CVE-2019-5822: CORS bypass in download manager\n* CVE-2019-5823: Forced navigation from service worker\n* CVE-2019-5812: URL spoof in Omnibox on iOS\n* CVE-2019-5816: Exploit persistence extension on Android\n* CVE-2019-5817: Heap buffer overflow in Angle on Windows\n\n- Update conditions to use system harfbuzz on TW+\n- Require java during build\n- Enable using pipewire when available\n\nThis update was imported from the openSUSE:Leap:15.0:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-1436", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1436-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:1436-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AWRISTZJJNJJPLDT4TNSJKAHMVL6J2RA/#AWRISTZJJNJJPLDT4TNSJKAHMVL6J2RA" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:1436-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AWRISTZJJNJJPLDT4TNSJKAHMVL6J2RA/#AWRISTZJJNJJPLDT4TNSJKAHMVL6J2RA" }, { "category": "self", "summary": "SUSE Bug 1133313", "url": "https://bugzilla.suse.com/1133313" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5805 page", "url": "https://www.suse.com/security/cve/CVE-2019-5805/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5806 page", "url": "https://www.suse.com/security/cve/CVE-2019-5806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5807 page", "url": "https://www.suse.com/security/cve/CVE-2019-5807/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5808 page", "url": "https://www.suse.com/security/cve/CVE-2019-5808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5809 page", "url": "https://www.suse.com/security/cve/CVE-2019-5809/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5810 page", "url": "https://www.suse.com/security/cve/CVE-2019-5810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5811 page", "url": "https://www.suse.com/security/cve/CVE-2019-5811/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5812 page", "url": "https://www.suse.com/security/cve/CVE-2019-5812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5813 page", "url": "https://www.suse.com/security/cve/CVE-2019-5813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5814 page", "url": "https://www.suse.com/security/cve/CVE-2019-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5815 page", "url": "https://www.suse.com/security/cve/CVE-2019-5815/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5816 page", "url": "https://www.suse.com/security/cve/CVE-2019-5816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5817 page", "url": "https://www.suse.com/security/cve/CVE-2019-5817/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5818 page", "url": "https://www.suse.com/security/cve/CVE-2019-5818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5819 page", "url": "https://www.suse.com/security/cve/CVE-2019-5819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5820 page", "url": "https://www.suse.com/security/cve/CVE-2019-5820/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5821 page", "url": "https://www.suse.com/security/cve/CVE-2019-5821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5822 page", "url": "https://www.suse.com/security/cve/CVE-2019-5822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5823 page", "url": "https://www.suse.com/security/cve/CVE-2019-5823/" } ], "title": "Security update for chromium", "tracking": { "current_release_date": "2019-05-22T16:41:14Z", "generator": { "date": "2019-05-22T16:41:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:1436-1", "initial_release_date": "2019-05-22T16:41:14Z", "revision_history": [ { "date": "2019-05-22T16:41:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "chromedriver-74.0.3729.108-bp150.207.1.x86_64", "product": { "name": "chromedriver-74.0.3729.108-bp150.207.1.x86_64", "product_id": "chromedriver-74.0.3729.108-bp150.207.1.x86_64" } }, { "category": "product_version", "name": "chromium-74.0.3729.108-bp150.207.1.x86_64", "product": { "name": "chromium-74.0.3729.108-bp150.207.1.x86_64", "product_id": "chromium-74.0.3729.108-bp150.207.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 15", "product": { "name": "SUSE Package Hub 15", "product_id": "SUSE Package Hub 15" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromedriver-74.0.3729.108-bp150.207.1.x86_64 as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64" }, "product_reference": "chromedriver-74.0.3729.108-bp150.207.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-74.0.3729.108-bp150.207.1.x86_64 as component of SUSE Package Hub 15", "product_id": "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" }, "product_reference": "chromium-74.0.3729.108-bp150.207.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5805" } ], "notes": [ { "category": "general", "text": "Use-after-free in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5805", "url": "https://www.suse.com/security/cve/CVE-2019-5805" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5805", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5805" }, { "cve": "CVE-2019-5806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5806" } ], "notes": [ { "category": "general", "text": "Integer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5806", "url": "https://www.suse.com/security/cve/CVE-2019-5806" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5806", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5806" }, { "cve": "CVE-2019-5807", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5807" } ], "notes": [ { "category": "general", "text": "Object lifetime issue in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5807", "url": "https://www.suse.com/security/cve/CVE-2019-5807" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5807", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5807" }, { "cve": "CVE-2019-5808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5808" } ], "notes": [ { "category": "general", "text": "Use after free in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5808", "url": "https://www.suse.com/security/cve/CVE-2019-5808" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5808", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5808" }, { "cve": "CVE-2019-5809", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5809" } ], "notes": [ { "category": "general", "text": "Use after free in file chooser in Google Chrome prior to 74.0.3729.108 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5809", "url": "https://www.suse.com/security/cve/CVE-2019-5809" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5809", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5809" }, { "cve": "CVE-2019-5810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5810" } ], "notes": [ { "category": "general", "text": "Information leak in autofill in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5810", "url": "https://www.suse.com/security/cve/CVE-2019-5810" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5810", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "moderate" } ], "title": "CVE-2019-5810" }, { "cve": "CVE-2019-5811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5811" } ], "notes": [ { "category": "general", "text": "Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5811", "url": "https://www.suse.com/security/cve/CVE-2019-5811" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5811", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5811" }, { "cve": "CVE-2019-5812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5812" } ], "notes": [ { "category": "general", "text": "Inadequate security UI in iOS UI in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to perform domain spoofing via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5812", "url": "https://www.suse.com/security/cve/CVE-2019-5812" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5812", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "moderate" } ], "title": "CVE-2019-5812" }, { "cve": "CVE-2019-5813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5813" } ], "notes": [ { "category": "general", "text": "Use after free in V8 in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5813", "url": "https://www.suse.com/security/cve/CVE-2019-5813" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5813", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5813" }, { "cve": "CVE-2019-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5814" } ], "notes": [ { "category": "general", "text": "Insufficient policy enforcement in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5814", "url": "https://www.suse.com/security/cve/CVE-2019-5814" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5814", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "moderate" } ], "title": "CVE-2019-5814" }, { "cve": "CVE-2019-5815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5815" } ], "notes": [ { "category": "general", "text": "Type confusion in xsltNumberFormatGetMultipleLevel prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5815", "url": "https://www.suse.com/security/cve/CVE-2019-5815" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5815", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5815" }, { "cve": "CVE-2019-5816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5816" } ], "notes": [ { "category": "general", "text": "Process lifetime issue in Chrome in Google Chrome on Android prior to 74.0.3729.108 allowed a remote attacker to potentially persist an exploited process via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5816", "url": "https://www.suse.com/security/cve/CVE-2019-5816" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5816", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5816" }, { "cve": "CVE-2019-5817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5817" } ], "notes": [ { "category": "general", "text": "Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5817", "url": "https://www.suse.com/security/cve/CVE-2019-5817" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5817", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5817" }, { "cve": "CVE-2019-5818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5818" } ], "notes": [ { "category": "general", "text": "Uninitialized data in media in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5818", "url": "https://www.suse.com/security/cve/CVE-2019-5818" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5818", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "moderate" } ], "title": "CVE-2019-5818" }, { "cve": "CVE-2019-5819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5819" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5819", "url": "https://www.suse.com/security/cve/CVE-2019-5819" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5819", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5819" }, { "cve": "CVE-2019-5820", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5820" } ], "notes": [ { "category": "general", "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5820", "url": "https://www.suse.com/security/cve/CVE-2019-5820" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5820", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5820" }, { "cve": "CVE-2019-5821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5821" } ], "notes": [ { "category": "general", "text": "Integer overflow in PDFium in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5821", "url": "https://www.suse.com/security/cve/CVE-2019-5821" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5821", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5821" }, { "cve": "CVE-2019-5822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5822" } ], "notes": [ { "category": "general", "text": "Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass same origin policy via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5822", "url": "https://www.suse.com/security/cve/CVE-2019-5822" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5822", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "important" } ], "title": "CVE-2019-5822" }, { "cve": "CVE-2019-5823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5823" } ], "notes": [ { "category": "general", "text": "Insufficient policy enforcement in service workers in Google Chrome prior to 74.0.3729.108 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5823", "url": "https://www.suse.com/security/cve/CVE-2019-5823" }, { "category": "external", "summary": "SUSE Bug 1133313 for CVE-2019-5823", "url": "https://bugzilla.suse.com/1133313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Package Hub 15:chromedriver-74.0.3729.108-bp150.207.1.x86_64", "SUSE Package Hub 15:chromium-74.0.3729.108-bp150.207.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-22T16:41:14Z", "details": "moderate" } ], "title": "CVE-2019-5823" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…