Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-5764 (GCVE-0-2019-5764)
Vulnerability from cvelistv5 – Published: 2019-02-19 17:00 – Updated: 2024-08-04 20:01- Use after free
| URL | Tags |
|---|---|
| http://www.securityfocus.com/bid/106767 | vdb-entryx_refsource_BID |
| https://access.redhat.com/errata/RHSA-2019:0309 | vendor-advisoryx_refsource_REDHAT |
| https://www.debian.org/security/2019/dsa-4395 | vendor-advisoryx_refsource_DEBIAN |
| https://chromereleases.googleblog.com/2019/01/sta… | x_refsource_CONFIRM |
| https://crbug.com/913246 | x_refsource_MISC |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T20:01:52.300Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "106767",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/106767"
},
{
"name": "RHSA-2019:0309",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"name": "DSA-4395",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://crbug.com/913246"
},
{
"name": "FEDORA-2019-561eae4626",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/"
},
{
"name": "FEDORA-2019-05a780936d",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "72.0.3626.81",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2019-01-29T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use after free",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-03-30T01:06:06.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"name": "106767",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/106767"
},
{
"name": "RHSA-2019:0309",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"name": "DSA-4395",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://crbug.com/913246"
},
{
"name": "FEDORA-2019-561eae4626",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/"
},
{
"name": "FEDORA-2019-05a780936d",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2019-5764",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "72.0.3626.81"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "106767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106767"
},
{
"name": "RHSA-2019:0309",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"name": "DSA-4395",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/913246",
"refsource": "MISC",
"url": "https://crbug.com/913246"
},
{
"name": "FEDORA-2019-561eae4626",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/"
},
{
"name": "FEDORA-2019-05a780936d",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2019-5764",
"datePublished": "2019-02-19T17:00:00.000Z",
"dateReserved": "2019-01-09T00:00:00.000Z",
"dateUpdated": "2024-08-04T20:01:52.300Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-5764",
"date": "2026-05-19",
"epss": "0.01442",
"percentile": "0.80943"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"72.0.3626.81\", \"matchCriteriaId\": \"0A4E5129-86E3-489C-A83F-2C01265EE29A\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BBCD86A-E6C7-4444-9D74-F861084090F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D100F7CE-FC64-4CC6-852A-6136D72DA419\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"}, {\"lang\": \"es\", \"value\": \"La gesti\\u00f3n de punteros incorrecta en WebRTC en Google Chrome, en versiones anteriores a la 72.0.3626.81, permit\\u00eda que un atacante remoto explotase la corrupci\\u00f3n de la memoria din\\u00e1mica (heap) mediante una p\\u00e1gina HTML manipulada.\"}]",
"id": "CVE-2019-5764",
"lastModified": "2024-11-21T04:45:26.770",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-02-19T17:29:00.877",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/106767\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0309\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://crbug.com/913246\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://www.debian.org/security/2019/dsa-4395\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"http://www.securityfocus.com/bid/106767\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0309\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://crbug.com/913246\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2019/dsa-4395\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}, {\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-5764\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2019-02-19T17:29:00.877\",\"lastModified\":\"2024-11-21T04:45:26.770\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"La gesti\u00f3n de punteros incorrecta en WebRTC en Google Chrome, en versiones anteriores a la 72.0.3626.81, permit\u00eda que un atacante remoto explotase la corrupci\u00f3n de la memoria din\u00e1mica (heap) mediante una p\u00e1gina HTML manipulada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"72.0.3626.81\",\"matchCriteriaId\":\"0A4E5129-86E3-489C-A83F-2C01265EE29A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/106767\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0309\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://crbug.com/913246\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4395\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.securityfocus.com/bid/106767\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://crbug.com/913246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4395\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2019-AVI-037
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Chrome versions ant\u00e9rieures \u00e0 72.0.3626.81",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-5768",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5768"
},
{
"name": "CVE-2019-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5754"
},
{
"name": "CVE-2019-5762",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5762"
},
{
"name": "CVE-2019-5773",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5773"
},
{
"name": "CVE-2019-5761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5761"
},
{
"name": "CVE-2019-5755",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5755"
},
{
"name": "CVE-2019-5767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5767"
},
{
"name": "CVE-2019-5764",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5764"
},
{
"name": "CVE-2019-5756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5756"
},
{
"name": "CVE-2019-5758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5758"
},
{
"name": "CVE-2019-5760",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5760"
},
{
"name": "CVE-2019-5759",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5759"
},
{
"name": "CVE-2019-5765",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5765"
},
{
"name": "CVE-2019-5777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5777"
},
{
"name": "CVE-2019-5763",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5763"
},
{
"name": "CVE-2019-5779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5779"
},
{
"name": "CVE-2019-5776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5776"
},
{
"name": "CVE-2019-5781",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5781"
},
{
"name": "CVE-2019-5766",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5766"
},
{
"name": "CVE-2019-5769",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5769"
},
{
"name": "CVE-2019-5770",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5770"
},
{
"name": "CVE-2019-5772",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5772"
},
{
"name": "CVE-2019-5757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5757"
},
{
"name": "CVE-2019-5782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5782"
},
{
"name": "CVE-2019-5780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5780"
},
{
"name": "CVE-2019-5775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5775"
},
{
"name": "CVE-2019-5771",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5771"
},
{
"name": "CVE-2019-5778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5778"
},
{
"name": "CVE-2019-5774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5774"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-037",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 29 janvier 2019",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html?utm_source=feedburner\u0026utm_medium=feed\u0026utm_campaign=Feed%3A+GoogleChromeReleases+%28Google+Chrome+Releases%29"
}
]
}
CERTFR-2019-AVI-037
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Chrome versions ant\u00e9rieures \u00e0 72.0.3626.81",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-5768",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5768"
},
{
"name": "CVE-2019-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5754"
},
{
"name": "CVE-2019-5762",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5762"
},
{
"name": "CVE-2019-5773",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5773"
},
{
"name": "CVE-2019-5761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5761"
},
{
"name": "CVE-2019-5755",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5755"
},
{
"name": "CVE-2019-5767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5767"
},
{
"name": "CVE-2019-5764",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5764"
},
{
"name": "CVE-2019-5756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5756"
},
{
"name": "CVE-2019-5758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5758"
},
{
"name": "CVE-2019-5760",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5760"
},
{
"name": "CVE-2019-5759",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5759"
},
{
"name": "CVE-2019-5765",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5765"
},
{
"name": "CVE-2019-5777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5777"
},
{
"name": "CVE-2019-5763",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5763"
},
{
"name": "CVE-2019-5779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5779"
},
{
"name": "CVE-2019-5776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5776"
},
{
"name": "CVE-2019-5781",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5781"
},
{
"name": "CVE-2019-5766",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5766"
},
{
"name": "CVE-2019-5769",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5769"
},
{
"name": "CVE-2019-5770",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5770"
},
{
"name": "CVE-2019-5772",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5772"
},
{
"name": "CVE-2019-5757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5757"
},
{
"name": "CVE-2019-5782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5782"
},
{
"name": "CVE-2019-5780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5780"
},
{
"name": "CVE-2019-5775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5775"
},
{
"name": "CVE-2019-5771",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5771"
},
{
"name": "CVE-2019-5778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5778"
},
{
"name": "CVE-2019-5774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5774"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-037",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 29 janvier 2019",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html?utm_source=feedburner\u0026utm_medium=feed\u0026utm_campaign=Feed%3A+GoogleChromeReleases+%28Google+Chrome+Releases%29"
}
]
}
BDU:2019-00909
Vulnerability from fstec - Published: 09.12.2018{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Google Inc",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), \u0434\u043e 72.0.3626.81 (Google Chrome), 8 (Debian GNU/Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f chromium:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 72.0.3626.81 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Debian:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 chromium) \u0434\u043e 72.0.3626.96-1~deb9u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.12.2018",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "06.03.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-00909",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-5764",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Google Chrome",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438 WebRTC \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438 WebRTC \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0439 HTML-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2019-5764\nhttps://security-tracker.debian.org/tracker/CVE-2019-5764 https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
CNVD-2019-06209
Vulnerability from cnvd - Published: 2019-03-06厂商已发布漏洞修复程序,请及时关注更新: https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
| Name | Google Chrome <72.0.3626.81 |
|---|
{
"cves": {
"cve": [
{
"cveNumber": "CVE-2019-5764"
},
{
"cveNumber": "106767"
}
]
},
"description": "Chrome\u662f\u7531\u8c37\u6b4c\u5f00\u53d1\u7684\u4e00\u6b3e\u8bbe\u8ba1\u7b80\u5355\u3001\u9ad8\u6548\u7684Web\u6d4f\u89c8\u5de5\u5177\uff0c\u5176\u7279\u70b9\u662f\u7b80\u6d01\u3001\u5feb\u901f\u3002\n\nGoogle Chrome 72.0.3626.81\u4e4b\u524d\u7248\u672c\u4e2d\u7684WebRTC\u5b58\u5728\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"discovererName": "Klzgrad, Qixun Zhao of Qihoo 360 Vulcan Team via Tianfu Cup, Jay Bosamiya, Anonymous, Alexandru Pitis, Microsoft Browser Vulnerability Research, Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd, Almog Benin, Zhe Jin(??),Luyao Liu(???) from",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-06209",
"openTime": "2019-03-06",
"patchDescription": "Chrome\u662f\u7531\u8c37\u6b4c\u5f00\u53d1\u7684\u4e00\u6b3e\u8bbe\u8ba1\u7b80\u5355\u3001\u9ad8\u6548\u7684Web\u6d4f\u89c8\u5de5\u5177\uff0c\u5176\u7279\u70b9\u662f\u7b80\u6d01\u3001\u5feb\u901f\u3002\r\n\r\nGoogle Chrome 72.0.3626.81\u4e4b\u524d\u7248\u672c\u4e2d\u7684WebRTC\u5b58\u5728\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Chrome\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\uff08CNVD-2019-06209\uff09\u7684\u8865\u4e01",
"products": {
"product": "Google Chrome \u003c72.0.3626.81"
},
"referenceLink": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html\r\nhttps://www.securityfocus.com/bid/106767",
"serverity": "\u4e2d",
"submitTime": "2019-01-31",
"title": "Google Chrome\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\uff08CNVD-2019-06209\uff09"
}
FKIE_CVE-2019-5764
Vulnerability from fkie_nvd - Published: 2019-02-19 17:29 - Updated: 2024-11-21 04:45| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| debian | debian_linux | 9.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_workstation | 6.0 | |
| fedoraproject | fedora | 29 | |
| fedoraproject | fedora | 30 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A4E5129-86E3-489C-A83F-2C01265EE29A",
"versionEndExcluding": "72.0.3626.81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
},
{
"lang": "es",
"value": "La gesti\u00f3n de punteros incorrecta en WebRTC en Google Chrome, en versiones anteriores a la 72.0.3626.81, permit\u00eda que un atacante remoto explotase la corrupci\u00f3n de la memoria din\u00e1mica (heap) mediante una p\u00e1gina HTML manipulada."
}
],
"id": "CVE-2019-5764",
"lastModified": "2024-11-21T04:45:26.770",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-02-19T17:29:00.877",
"references": [
{
"source": "chrome-cve-admin@google.com",
"url": "http://www.securityfocus.com/bid/106767"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://crbug.com/913246"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/106767"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://crbug.com/913246"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2019/dsa-4395"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
},
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-CVJH-V93Q-8C36
Vulnerability from github – Published: 2022-05-13 01:22 – Updated: 2022-05-13 01:22Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
{
"affected": [],
"aliases": [
"CVE-2019-5764"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-02-19T17:29:00Z",
"severity": "HIGH"
},
"details": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GHSA-cvjh-v93q-8c36",
"modified": "2022-05-13T01:22:33Z",
"published": "2022-05-13T01:22:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5764"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"type": "WEB",
"url": "https://crbug.com/913246"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/106767"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2019-5764
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-5764",
"description": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2019-5764",
"references": [
"https://www.suse.com/security/cve/CVE-2019-5764.html",
"https://www.debian.org/security/2019/dsa-4395",
"https://access.redhat.com/errata/RHSA-2019:0309",
"https://security.archlinux.org/CVE-2019-5764"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-5764"
],
"details": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2019-5764",
"modified": "2023-12-13T01:23:55.247133Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2019-5764",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "72.0.3626.81"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "106767",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106767"
},
{
"name": "RHSA-2019:0309",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"name": "DSA-4395",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/913246",
"refsource": "MISC",
"url": "https://crbug.com/913246"
},
{
"name": "FEDORA-2019-561eae4626",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/"
},
{
"name": "FEDORA-2019-05a780936d",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "72.0.3626.81",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2019-5764"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
},
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://crbug.com/913246",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://crbug.com/913246"
},
{
"name": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html"
},
{
"name": "DSA-4395",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4395"
},
{
"name": "RHSA-2019:0309",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0309"
},
{
"name": "106767",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/106767"
},
{
"name": "FEDORA-2019-561eae4626",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/"
},
{
"name": "FEDORA-2019-05a780936d",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-08-24T17:37Z",
"publishedDate": "2019-02-19T17:29Z"
}
}
}
OPENSUSE-SU-2019:0204-1
Vulnerability from csaf_opensuse - Published: 2019-03-23 11:00 - Updated: 2019-03-23 11:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for Chromium to version 72.0.3626.96 fixes the following issues:\n\nSecurity issues fixed (bsc#1123641 and bsc#1124936):\n\n- CVE-2019-5784: Inappropriate implementation in V8 \n- CVE-2019-5754: Inappropriate implementation in QUIC Networking.\n- CVE-2019-5782: Inappropriate implementation in V8. \n- CVE-2019-5755: Inappropriate implementation in V8. \n- CVE-2019-5756: Use after free in PDFium. \n- CVE-2019-5757: Type Confusion in SVG.\n- CVE-2019-5758: Use after free in Blink.\n- CVE-2019-5759: Use after free in HTML select elements.\n- CVE-2019-5760: Use after free in WebRTC. \n- CVE-2019-5761: Use after free in SwiftShader.\n- CVE-2019-5762: Use after free in PDFium. \n- CVE-2019-5763: Insufficient validation of untrusted input in V8.\n- CVE-2019-5764: Use after free in WebRTC. \n- CVE-2019-5765: Insufficient policy enforcement in the browser.\n- CVE-2019-5766: Insufficient policy enforcement in Canvas.\n- CVE-2019-5767: Incorrect security UI in WebAPKs. \n- CVE-2019-5768: Insufficient policy enforcement in DevTools. \n- CVE-2019-5769: Insufficient validation of untrusted input in Blink.\n- CVE-2019-5770: Heap buffer overflow in WebGL. \n- CVE-2019-5771: Heap buffer overflow in SwiftShader.\n- CVE-2019-5772: Use after free in PDFium. \n- CVE-2019-5773: Insufficient data validation in IndexedDB.\n- CVE-2019-5774: Insufficient validation of untrusted input in SafeBrowsing. \n- CVE-2019-5775: Insufficient policy enforcement in Omnibox. \n- CVE-2019-5776: Insufficient policy enforcement in Omnibox. \n- CVE-2019-5777: Insufficient policy enforcement in Omnibox. \n- CVE-2019-5778: Insufficient policy enforcement in Extensions.\n- CVE-2019-5779: Insufficient policy enforcement in ServiceWorker.\n- CVE-2019-5780: Insufficient policy enforcement. \n- CVE-2019-5781: Insufficient policy enforcement in Omnibox.\n\nFor a full list of changes refer to https://chromereleases.googleblog.com/2019/02/stable-channel-update-for-desktop.html\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-204",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0204-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:0204-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6AZBIOI4CCNIR3X3SSX2E6OCQBIEIHD/#I6AZBIOI4CCNIR3X3SSX2E6OCQBIEIHD"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:0204-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6AZBIOI4CCNIR3X3SSX2E6OCQBIEIHD/#I6AZBIOI4CCNIR3X3SSX2E6OCQBIEIHD"
},
{
"category": "self",
"summary": "SUSE Bug 1123641",
"url": "https://bugzilla.suse.com/1123641"
},
{
"category": "self",
"summary": "SUSE Bug 1124936",
"url": "https://bugzilla.suse.com/1124936"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5755 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5756 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5757 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5758 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5759 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5760 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5761 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5762 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5763 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5764 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5765 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5766 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5767 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5768 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5770 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5771 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5772 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5773 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5773/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5774 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5775 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5776 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5777 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5778 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5779 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5779/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5780 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5780/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5781 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5782 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5784 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5784/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2019-03-23T11:00:36Z",
"generator": {
"date": "2019-03-23T11:00:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:0204-1",
"initial_release_date": "2019-03-23T11:00:36Z",
"revision_history": [
{
"date": "2019-03-23T11:00:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"product": {
"name": "chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"product_id": "chromedriver-72.0.3626.96-lp150.2.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-72.0.3626.96-lp150.2.41.1.x86_64",
"product": {
"name": "chromium-72.0.3626.96-lp150.2.41.1.x86_64",
"product_id": "chromium-72.0.3626.96-lp150.2.41.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-72.0.3626.96-lp150.2.41.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64"
},
"product_reference": "chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-72.0.3626.96-lp150.2.41.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
},
"product_reference": "chromium-72.0.3626.96-lp150.2.41.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5754"
}
],
"notes": [
{
"category": "general",
"text": "Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5754",
"url": "https://www.suse.com/security/cve/CVE-2019-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5754",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "critical"
}
],
"title": "CVE-2019-5754"
},
{
"cve": "CVE-2019-5755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5755"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5755",
"url": "https://www.suse.com/security/cve/CVE-2019-5755"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5755",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5755"
},
{
"cve": "CVE-2019-5756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5756"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5756",
"url": "https://www.suse.com/security/cve/CVE-2019-5756"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5756",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5756"
},
{
"cve": "CVE-2019-5757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5757"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5757",
"url": "https://www.suse.com/security/cve/CVE-2019-5757"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5757",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5757"
},
{
"cve": "CVE-2019-5758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5758"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect object lifecycle management in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5758",
"url": "https://www.suse.com/security/cve/CVE-2019-5758"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5758",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5758"
},
{
"cve": "CVE-2019-5759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5759"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect lifetime handling in HTML select elements in Google Chrome on Android and Mac prior to 72.0.3626.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5759",
"url": "https://www.suse.com/security/cve/CVE-2019-5759"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5759",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "critical"
}
],
"title": "CVE-2019-5759"
},
{
"cve": "CVE-2019-5760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5760"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5760",
"url": "https://www.suse.com/security/cve/CVE-2019-5760"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5760",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5760"
},
{
"cve": "CVE-2019-5761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5761"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect object lifecycle management in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5761",
"url": "https://www.suse.com/security/cve/CVE-2019-5761"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5761",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5761"
},
{
"cve": "CVE-2019-5762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5762"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5762",
"url": "https://www.suse.com/security/cve/CVE-2019-5762"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5762",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5762"
},
{
"cve": "CVE-2019-5763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5763"
}
],
"notes": [
{
"category": "general",
"text": "Failure to check error conditions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5763",
"url": "https://www.suse.com/security/cve/CVE-2019-5763"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5763",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5763"
},
{
"cve": "CVE-2019-5764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5764"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5764",
"url": "https://www.suse.com/security/cve/CVE-2019-5764"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5764",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5764"
},
{
"cve": "CVE-2019-5765",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5765"
}
],
"notes": [
{
"category": "general",
"text": "An exposed debugging endpoint in the browser in Google Chrome on Android prior to 72.0.3626.81 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted Intent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5765",
"url": "https://www.suse.com/security/cve/CVE-2019-5765"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5765",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5765"
},
{
"cve": "CVE-2019-5766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5766"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of origin taint checking in Canvas in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5766",
"url": "https://www.suse.com/security/cve/CVE-2019-5766"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5766",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5766"
},
{
"cve": "CVE-2019-5767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5767"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient protection of permission UI in WebAPKs in Google Chrome on Android prior to 72.0.3626.81 allowed an attacker who convinced the user to install a malicious application to access privacy/security sensitive web APIs via a crafted APK.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5767",
"url": "https://www.suse.com/security/cve/CVE-2019-5767"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5767",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5767"
},
{
"cve": "CVE-2019-5768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5768"
}
],
"notes": [
{
"category": "general",
"text": "DevTools API not correctly gating on extension capability in DevTools in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5768",
"url": "https://www.suse.com/security/cve/CVE-2019-5768"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5768",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5768"
},
{
"cve": "CVE-2019-5769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5769"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of invalid end character position when front rendering in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5769",
"url": "https://www.suse.com/security/cve/CVE-2019-5769"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5769",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5769"
},
{
"cve": "CVE-2019-5770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5770"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in WebGL in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5770",
"url": "https://www.suse.com/security/cve/CVE-2019-5770"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5770",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5770"
},
{
"cve": "CVE-2019-5771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5771"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect JIT of GLSL shaders in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5771",
"url": "https://www.suse.com/security/cve/CVE-2019-5771"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5771",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5771"
},
{
"cve": "CVE-2019-5772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5772"
}
],
"notes": [
{
"category": "general",
"text": "Sharing of objects over calls into JavaScript runtime in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5772",
"url": "https://www.suse.com/security/cve/CVE-2019-5772"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5772",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "low"
}
],
"title": "CVE-2019-5772"
},
{
"cve": "CVE-2019-5773",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5773"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient origin validation in IndexedDB in Google Chrome prior to 72.0.3626.81 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5773",
"url": "https://www.suse.com/security/cve/CVE-2019-5773"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5773",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5773"
},
{
"cve": "CVE-2019-5774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5774"
}
],
"notes": [
{
"category": "general",
"text": "Omission of the .desktop filetype from the Safe Browsing checklist in SafeBrowsing in Google Chrome on Linux prior to 72.0.3626.81 allowed an attacker who convinced a user to download a .desktop file to execute arbitrary code via a downloaded .desktop file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5774",
"url": "https://www.suse.com/security/cve/CVE-2019-5774"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5774",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5774"
},
{
"cve": "CVE-2019-5775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5775"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5775",
"url": "https://www.suse.com/security/cve/CVE-2019-5775"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5775",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5775"
},
{
"cve": "CVE-2019-5776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5776"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5776",
"url": "https://www.suse.com/security/cve/CVE-2019-5776"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5776",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5776"
},
{
"cve": "CVE-2019-5777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5777"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5777",
"url": "https://www.suse.com/security/cve/CVE-2019-5777"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5777",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5777"
},
{
"cve": "CVE-2019-5778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5778"
}
],
"notes": [
{
"category": "general",
"text": "A missing case for handling special schemes in permission request checks in Extensions in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5778",
"url": "https://www.suse.com/security/cve/CVE-2019-5778"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5778",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5778"
},
{
"cve": "CVE-2019-5779",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5779"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy validation in ServiceWorker in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5779",
"url": "https://www.suse.com/security/cve/CVE-2019-5779"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5779",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5779"
},
{
"cve": "CVE-2019-5780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5780"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5780",
"url": "https://www.suse.com/security/cve/CVE-2019-5780"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5780",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5780"
},
{
"cve": "CVE-2019-5781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5781"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5781",
"url": "https://www.suse.com/security/cve/CVE-2019-5781"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5781",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "moderate"
}
],
"title": "CVE-2019-5781"
},
{
"cve": "CVE-2019-5782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5782"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect optimization assumptions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5782",
"url": "https://www.suse.com/security/cve/CVE-2019-5782"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5782",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5782"
},
{
"cve": "CVE-2019-5784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5784"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of deferred code in V8 in Google Chrome prior to 72.0.3626.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5784",
"url": "https://www.suse.com/security/cve/CVE-2019-5784"
},
{
"category": "external",
"summary": "SUSE Bug 1124936 for CVE-2019-5784",
"url": "https://bugzilla.suse.com/1124936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:chromedriver-72.0.3626.96-lp150.2.41.1.x86_64",
"openSUSE Leap 15.0:chromium-72.0.3626.96-lp150.2.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-03-23T11:00:36Z",
"details": "important"
}
],
"title": "CVE-2019-5784"
}
]
}
OPENSUSE-SU-2019:0206-1
Vulnerability from csaf_opensuse - Published: 2019-02-18 16:59 - Updated: 2019-02-18 16:59| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for Chromium to version 72.0.3626.96 fixes the following issues:\n\nSecurity issues fixed (bsc#1123641 and bsc#1124936):\n\n- CVE-2019-5784: Inappropriate implementation in V8 \n- CVE-2019-5754: Inappropriate implementation in QUIC Networking.\n- CVE-2019-5782: Inappropriate implementation in V8.\n- CVE-2019-5755: Inappropriate implementation in V8.\n- CVE-2019-5756: Use after free in PDFium.\n- CVE-2019-5757: Type Confusion in SVG.\n- CVE-2019-5758: Use after free in Blink.\n- CVE-2019-5759: Use after free in HTML select elements.\n- CVE-2019-5760: Use after free in WebRTC.\n- CVE-2019-5761: Use after free in SwiftShader.\n- CVE-2019-5762: Use after free in PDFium.\n- CVE-2019-5763: Insufficient validation of untrusted input in V8.\n- CVE-2019-5764: Use after free in WebRTC.\n- CVE-2019-5765: Insufficient policy enforcement in the browser.\n- CVE-2019-5766: Insufficient policy enforcement in Canvas.\n- CVE-2019-5767: Incorrect security UI in WebAPKs.\n- CVE-2019-5768: Insufficient policy enforcement in DevTools.\n- CVE-2019-5769: Insufficient validation of untrusted input in Blink.\n- CVE-2019-5770: Heap buffer overflow in WebGL.\n- CVE-2019-5771: Heap buffer overflow in SwiftShader.\n- CVE-2019-5772: Use after free in PDFium.\n- CVE-2019-5773: Insufficient data validation in IndexedDB.\n- CVE-2019-5774: Insufficient validation of untrusted input in SafeBrowsing.\n- CVE-2019-5775: Insufficient policy enforcement in Omnibox.\n- CVE-2019-5776: Insufficient policy enforcement in Omnibox.\n- CVE-2019-5777: Insufficient policy enforcement in Omnibox.\n- CVE-2019-5778: Insufficient policy enforcement in Extensions.\n- CVE-2019-5779: Insufficient policy enforcement in ServiceWorker.\n- CVE-2019-5780: Insufficient policy enforcement.\n- CVE-2019-5781: Insufficient policy enforcement in Omnibox.\n\nFor a full list of changes refer to https://chromereleases.googleblog.com/2019/02/stable-channel-update-for-desktop.html\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-206",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0206-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:0206-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54XI3C3VCSGOQQM3NLSI4PKNDNEPEMXX/#54XI3C3VCSGOQQM3NLSI4PKNDNEPEMXX"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:0206-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/54XI3C3VCSGOQQM3NLSI4PKNDNEPEMXX/#54XI3C3VCSGOQQM3NLSI4PKNDNEPEMXX"
},
{
"category": "self",
"summary": "SUSE Bug 1123641",
"url": "https://bugzilla.suse.com/1123641"
},
{
"category": "self",
"summary": "SUSE Bug 1124936",
"url": "https://bugzilla.suse.com/1124936"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5755 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5756 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5757 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5758 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5759 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5760 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5761 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5762 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5763 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5764 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5765 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5766 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5767 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5768 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5770 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5771 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5772 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5773 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5773/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5774 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5775 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5776 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5777 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5778 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5779 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5779/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5780 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5780/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5781 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5782 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5784 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5784/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2019-02-18T16:59:22Z",
"generator": {
"date": "2019-02-18T16:59:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:0206-1",
"initial_release_date": "2019-02-18T16:59:22Z",
"revision_history": [
{
"date": "2019-02-18T16:59:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-72.0.3626.96-88.1.x86_64",
"product": {
"name": "chromedriver-72.0.3626.96-88.1.x86_64",
"product_id": "chromedriver-72.0.3626.96-88.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-72.0.3626.96-88.1.x86_64",
"product": {
"name": "chromium-72.0.3626.96-88.1.x86_64",
"product_id": "chromium-72.0.3626.96-88.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12 SP2",
"product": {
"name": "SUSE Package Hub 12 SP2",
"product_id": "SUSE Package Hub 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-72.0.3626.96-88.1.x86_64 as component of SUSE Package Hub 12 SP2",
"product_id": "SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64"
},
"product_reference": "chromedriver-72.0.3626.96-88.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-72.0.3626.96-88.1.x86_64 as component of SUSE Package Hub 12 SP2",
"product_id": "SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
},
"product_reference": "chromium-72.0.3626.96-88.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5754"
}
],
"notes": [
{
"category": "general",
"text": "Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5754",
"url": "https://www.suse.com/security/cve/CVE-2019-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5754",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "critical"
}
],
"title": "CVE-2019-5754"
},
{
"cve": "CVE-2019-5755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5755"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5755",
"url": "https://www.suse.com/security/cve/CVE-2019-5755"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5755",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5755"
},
{
"cve": "CVE-2019-5756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5756"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5756",
"url": "https://www.suse.com/security/cve/CVE-2019-5756"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5756",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5756"
},
{
"cve": "CVE-2019-5757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5757"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5757",
"url": "https://www.suse.com/security/cve/CVE-2019-5757"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5757",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5757"
},
{
"cve": "CVE-2019-5758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5758"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect object lifecycle management in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5758",
"url": "https://www.suse.com/security/cve/CVE-2019-5758"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5758",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5758"
},
{
"cve": "CVE-2019-5759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5759"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect lifetime handling in HTML select elements in Google Chrome on Android and Mac prior to 72.0.3626.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5759",
"url": "https://www.suse.com/security/cve/CVE-2019-5759"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5759",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "critical"
}
],
"title": "CVE-2019-5759"
},
{
"cve": "CVE-2019-5760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5760"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5760",
"url": "https://www.suse.com/security/cve/CVE-2019-5760"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5760",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5760"
},
{
"cve": "CVE-2019-5761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5761"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect object lifecycle management in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5761",
"url": "https://www.suse.com/security/cve/CVE-2019-5761"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5761",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5761"
},
{
"cve": "CVE-2019-5762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5762"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5762",
"url": "https://www.suse.com/security/cve/CVE-2019-5762"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5762",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5762"
},
{
"cve": "CVE-2019-5763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5763"
}
],
"notes": [
{
"category": "general",
"text": "Failure to check error conditions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5763",
"url": "https://www.suse.com/security/cve/CVE-2019-5763"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5763",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5763"
},
{
"cve": "CVE-2019-5764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5764"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5764",
"url": "https://www.suse.com/security/cve/CVE-2019-5764"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5764",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5764"
},
{
"cve": "CVE-2019-5765",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5765"
}
],
"notes": [
{
"category": "general",
"text": "An exposed debugging endpoint in the browser in Google Chrome on Android prior to 72.0.3626.81 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted Intent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5765",
"url": "https://www.suse.com/security/cve/CVE-2019-5765"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5765",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5765"
},
{
"cve": "CVE-2019-5766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5766"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of origin taint checking in Canvas in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5766",
"url": "https://www.suse.com/security/cve/CVE-2019-5766"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5766",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5766"
},
{
"cve": "CVE-2019-5767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5767"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient protection of permission UI in WebAPKs in Google Chrome on Android prior to 72.0.3626.81 allowed an attacker who convinced the user to install a malicious application to access privacy/security sensitive web APIs via a crafted APK.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5767",
"url": "https://www.suse.com/security/cve/CVE-2019-5767"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5767",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5767"
},
{
"cve": "CVE-2019-5768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5768"
}
],
"notes": [
{
"category": "general",
"text": "DevTools API not correctly gating on extension capability in DevTools in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5768",
"url": "https://www.suse.com/security/cve/CVE-2019-5768"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5768",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5768"
},
{
"cve": "CVE-2019-5769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5769"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of invalid end character position when front rendering in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5769",
"url": "https://www.suse.com/security/cve/CVE-2019-5769"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5769",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5769"
},
{
"cve": "CVE-2019-5770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5770"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in WebGL in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5770",
"url": "https://www.suse.com/security/cve/CVE-2019-5770"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5770",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5770"
},
{
"cve": "CVE-2019-5771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5771"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect JIT of GLSL shaders in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5771",
"url": "https://www.suse.com/security/cve/CVE-2019-5771"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5771",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5771"
},
{
"cve": "CVE-2019-5772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5772"
}
],
"notes": [
{
"category": "general",
"text": "Sharing of objects over calls into JavaScript runtime in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5772",
"url": "https://www.suse.com/security/cve/CVE-2019-5772"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5772",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "low"
}
],
"title": "CVE-2019-5772"
},
{
"cve": "CVE-2019-5773",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5773"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient origin validation in IndexedDB in Google Chrome prior to 72.0.3626.81 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5773",
"url": "https://www.suse.com/security/cve/CVE-2019-5773"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5773",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5773"
},
{
"cve": "CVE-2019-5774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5774"
}
],
"notes": [
{
"category": "general",
"text": "Omission of the .desktop filetype from the Safe Browsing checklist in SafeBrowsing in Google Chrome on Linux prior to 72.0.3626.81 allowed an attacker who convinced a user to download a .desktop file to execute arbitrary code via a downloaded .desktop file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5774",
"url": "https://www.suse.com/security/cve/CVE-2019-5774"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5774",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5774"
},
{
"cve": "CVE-2019-5775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5775"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5775",
"url": "https://www.suse.com/security/cve/CVE-2019-5775"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5775",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5775"
},
{
"cve": "CVE-2019-5776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5776"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5776",
"url": "https://www.suse.com/security/cve/CVE-2019-5776"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5776",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5776"
},
{
"cve": "CVE-2019-5777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5777"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5777",
"url": "https://www.suse.com/security/cve/CVE-2019-5777"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5777",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5777"
},
{
"cve": "CVE-2019-5778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5778"
}
],
"notes": [
{
"category": "general",
"text": "A missing case for handling special schemes in permission request checks in Extensions in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5778",
"url": "https://www.suse.com/security/cve/CVE-2019-5778"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5778",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5778"
},
{
"cve": "CVE-2019-5779",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5779"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy validation in ServiceWorker in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5779",
"url": "https://www.suse.com/security/cve/CVE-2019-5779"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5779",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5779"
},
{
"cve": "CVE-2019-5780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5780"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5780",
"url": "https://www.suse.com/security/cve/CVE-2019-5780"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5780",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5780"
},
{
"cve": "CVE-2019-5781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5781"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5781",
"url": "https://www.suse.com/security/cve/CVE-2019-5781"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5781",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-5781"
},
{
"cve": "CVE-2019-5782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5782"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect optimization assumptions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5782",
"url": "https://www.suse.com/security/cve/CVE-2019-5782"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5782",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5782"
},
{
"cve": "CVE-2019-5784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5784"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of deferred code in V8 in Google Chrome prior to 72.0.3626.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5784",
"url": "https://www.suse.com/security/cve/CVE-2019-5784"
},
{
"category": "external",
"summary": "SUSE Bug 1124936 for CVE-2019-5784",
"url": "https://bugzilla.suse.com/1124936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 12 SP2:chromedriver-72.0.3626.96-88.1.x86_64",
"SUSE Package Hub 12 SP2:chromium-72.0.3626.96-88.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-18T16:59:22Z",
"details": "important"
}
],
"title": "CVE-2019-5784"
}
]
}
OPENSUSE-SU-2019:0216-1
Vulnerability from csaf_opensuse - Published: 2019-02-19 10:08 - Updated: 2019-02-19 10:08| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for Chromium to version 72.0.3626.96 fixes the following issues:\n\nSecurity issues fixed (bsc#1123641 and bsc#1124936):\n\n- CVE-2019-5784: Inappropriate implementation in V8 \n- CVE-2019-5754: Inappropriate implementation in QUIC Networking.\n- CVE-2019-5782: Inappropriate implementation in V8. \n- CVE-2019-5755: Inappropriate implementation in V8. \n- CVE-2019-5756: Use after free in PDFium. \n- CVE-2019-5757: Type Confusion in SVG.\n- CVE-2019-5758: Use after free in Blink.\n- CVE-2019-5759: Use after free in HTML select elements.\n- CVE-2019-5760: Use after free in WebRTC. \n- CVE-2019-5761: Use after free in SwiftShader.\n- CVE-2019-5762: Use after free in PDFium. \n- CVE-2019-5763: Insufficient validation of untrusted input in V8.\n- CVE-2019-5764: Use after free in WebRTC. \n- CVE-2019-5765: Insufficient policy enforcement in the browser.\n- CVE-2019-5766: Insufficient policy enforcement in Canvas.\n- CVE-2019-5767: Incorrect security UI in WebAPKs. \n- CVE-2019-5768: Insufficient policy enforcement in DevTools. \n- CVE-2019-5769: Insufficient validation of untrusted input in Blink.\n- CVE-2019-5770: Heap buffer overflow in WebGL. \n- CVE-2019-5771: Heap buffer overflow in SwiftShader.\n- CVE-2019-5772: Use after free in PDFium. \n- CVE-2019-5773: Insufficient data validation in IndexedDB.\n- CVE-2019-5774: Insufficient validation of untrusted input in SafeBrowsing. \n- CVE-2019-5775: Insufficient policy enforcement in Omnibox. \n- CVE-2019-5776: Insufficient policy enforcement in Omnibox. \n- CVE-2019-5777: Insufficient policy enforcement in Omnibox. \n- CVE-2019-5778: Insufficient policy enforcement in Extensions.\n- CVE-2019-5779: Insufficient policy enforcement in ServiceWorker.\n- CVE-2019-5780: Insufficient policy enforcement. \n- CVE-2019-5781: Insufficient policy enforcement in Omnibox.\n\nFor a full list of changes refer to https://chromereleases.googleblog.com/2019/02/stable-channel-update-for-desktop.html\n \nThis update was imported from the openSUSE:Leap:15.0:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-216",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0216-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:0216-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ML6QGHGVYBG5SQSSH72SSZYFIXFDLUW/#2ML6QGHGVYBG5SQSSH72SSZYFIXFDLUW"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:0216-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ML6QGHGVYBG5SQSSH72SSZYFIXFDLUW/#2ML6QGHGVYBG5SQSSH72SSZYFIXFDLUW"
},
{
"category": "self",
"summary": "SUSE Bug 1123641",
"url": "https://bugzilla.suse.com/1123641"
},
{
"category": "self",
"summary": "SUSE Bug 1124936",
"url": "https://bugzilla.suse.com/1124936"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5755 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5756 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5757 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5758 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5759 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5760 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5761 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5762 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5763 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5764 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5765 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5766 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5767 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5768 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5770 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5771 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5772 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5773 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5773/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5774 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5775 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5776 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5777 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5778 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5779 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5779/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5780 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5780/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5781 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5782 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5784 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5784/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2019-02-19T10:08:13Z",
"generator": {
"date": "2019-02-19T10:08:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:0216-1",
"initial_release_date": "2019-02-19T10:08:13Z",
"revision_history": [
{
"date": "2019-02-19T10:08:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"product": {
"name": "chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"product_id": "chromedriver-72.0.3626.96-bp150.2.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"product": {
"name": "chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"product_id": "chromium-72.0.3626.96-bp150.2.32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"product": {
"name": "chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"product_id": "chromedriver-72.0.3626.96-bp150.2.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-72.0.3626.96-bp150.2.32.1.x86_64",
"product": {
"name": "chromium-72.0.3626.96-bp150.2.32.1.x86_64",
"product_id": "chromium-72.0.3626.96-bp150.2.32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15",
"product": {
"name": "SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-72.0.3626.96-bp150.2.32.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64"
},
"product_reference": "chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-72.0.3626.96-bp150.2.32.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64"
},
"product_reference": "chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-72.0.3626.96-bp150.2.32.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64"
},
"product_reference": "chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-72.0.3626.96-bp150.2.32.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
},
"product_reference": "chromium-72.0.3626.96-bp150.2.32.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5754"
}
],
"notes": [
{
"category": "general",
"text": "Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5754",
"url": "https://www.suse.com/security/cve/CVE-2019-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5754",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "critical"
}
],
"title": "CVE-2019-5754"
},
{
"cve": "CVE-2019-5755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5755"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5755",
"url": "https://www.suse.com/security/cve/CVE-2019-5755"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5755",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5755"
},
{
"cve": "CVE-2019-5756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5756"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5756",
"url": "https://www.suse.com/security/cve/CVE-2019-5756"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5756",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5756"
},
{
"cve": "CVE-2019-5757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5757"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5757",
"url": "https://www.suse.com/security/cve/CVE-2019-5757"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5757",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5757"
},
{
"cve": "CVE-2019-5758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5758"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect object lifecycle management in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5758",
"url": "https://www.suse.com/security/cve/CVE-2019-5758"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5758",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5758"
},
{
"cve": "CVE-2019-5759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5759"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect lifetime handling in HTML select elements in Google Chrome on Android and Mac prior to 72.0.3626.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5759",
"url": "https://www.suse.com/security/cve/CVE-2019-5759"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5759",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "critical"
}
],
"title": "CVE-2019-5759"
},
{
"cve": "CVE-2019-5760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5760"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5760",
"url": "https://www.suse.com/security/cve/CVE-2019-5760"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5760",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5760"
},
{
"cve": "CVE-2019-5761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5761"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect object lifecycle management in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5761",
"url": "https://www.suse.com/security/cve/CVE-2019-5761"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5761",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5761"
},
{
"cve": "CVE-2019-5762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5762"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5762",
"url": "https://www.suse.com/security/cve/CVE-2019-5762"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5762",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5762"
},
{
"cve": "CVE-2019-5763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5763"
}
],
"notes": [
{
"category": "general",
"text": "Failure to check error conditions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5763",
"url": "https://www.suse.com/security/cve/CVE-2019-5763"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5763",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5763"
},
{
"cve": "CVE-2019-5764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5764"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5764",
"url": "https://www.suse.com/security/cve/CVE-2019-5764"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5764",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5764"
},
{
"cve": "CVE-2019-5765",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5765"
}
],
"notes": [
{
"category": "general",
"text": "An exposed debugging endpoint in the browser in Google Chrome on Android prior to 72.0.3626.81 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted Intent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5765",
"url": "https://www.suse.com/security/cve/CVE-2019-5765"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5765",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5765"
},
{
"cve": "CVE-2019-5766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5766"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of origin taint checking in Canvas in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5766",
"url": "https://www.suse.com/security/cve/CVE-2019-5766"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5766",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5766"
},
{
"cve": "CVE-2019-5767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5767"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient protection of permission UI in WebAPKs in Google Chrome on Android prior to 72.0.3626.81 allowed an attacker who convinced the user to install a malicious application to access privacy/security sensitive web APIs via a crafted APK.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5767",
"url": "https://www.suse.com/security/cve/CVE-2019-5767"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5767",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5767"
},
{
"cve": "CVE-2019-5768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5768"
}
],
"notes": [
{
"category": "general",
"text": "DevTools API not correctly gating on extension capability in DevTools in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5768",
"url": "https://www.suse.com/security/cve/CVE-2019-5768"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5768",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5768"
},
{
"cve": "CVE-2019-5769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5769"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of invalid end character position when front rendering in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5769",
"url": "https://www.suse.com/security/cve/CVE-2019-5769"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5769",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5769"
},
{
"cve": "CVE-2019-5770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5770"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient input validation in WebGL in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5770",
"url": "https://www.suse.com/security/cve/CVE-2019-5770"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5770",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5770"
},
{
"cve": "CVE-2019-5771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5771"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect JIT of GLSL shaders in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5771",
"url": "https://www.suse.com/security/cve/CVE-2019-5771"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5771",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5771"
},
{
"cve": "CVE-2019-5772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5772"
}
],
"notes": [
{
"category": "general",
"text": "Sharing of objects over calls into JavaScript runtime in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5772",
"url": "https://www.suse.com/security/cve/CVE-2019-5772"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5772",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "low"
}
],
"title": "CVE-2019-5772"
},
{
"cve": "CVE-2019-5773",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5773"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient origin validation in IndexedDB in Google Chrome prior to 72.0.3626.81 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5773",
"url": "https://www.suse.com/security/cve/CVE-2019-5773"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5773",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5773"
},
{
"cve": "CVE-2019-5774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5774"
}
],
"notes": [
{
"category": "general",
"text": "Omission of the .desktop filetype from the Safe Browsing checklist in SafeBrowsing in Google Chrome on Linux prior to 72.0.3626.81 allowed an attacker who convinced a user to download a .desktop file to execute arbitrary code via a downloaded .desktop file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5774",
"url": "https://www.suse.com/security/cve/CVE-2019-5774"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5774",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5774"
},
{
"cve": "CVE-2019-5775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5775"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5775",
"url": "https://www.suse.com/security/cve/CVE-2019-5775"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5775",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5775"
},
{
"cve": "CVE-2019-5776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5776"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5776",
"url": "https://www.suse.com/security/cve/CVE-2019-5776"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5776",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5776"
},
{
"cve": "CVE-2019-5777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5777"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5777",
"url": "https://www.suse.com/security/cve/CVE-2019-5777"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5777",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5777"
},
{
"cve": "CVE-2019-5778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5778"
}
],
"notes": [
{
"category": "general",
"text": "A missing case for handling special schemes in permission request checks in Extensions in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5778",
"url": "https://www.suse.com/security/cve/CVE-2019-5778"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5778",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5778"
},
{
"cve": "CVE-2019-5779",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5779"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy validation in ServiceWorker in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5779",
"url": "https://www.suse.com/security/cve/CVE-2019-5779"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5779",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5779"
},
{
"cve": "CVE-2019-5780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5780"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5780",
"url": "https://www.suse.com/security/cve/CVE-2019-5780"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5780",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5780"
},
{
"cve": "CVE-2019-5781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5781"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5781",
"url": "https://www.suse.com/security/cve/CVE-2019-5781"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5781",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "moderate"
}
],
"title": "CVE-2019-5781"
},
{
"cve": "CVE-2019-5782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5782"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect optimization assumptions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5782",
"url": "https://www.suse.com/security/cve/CVE-2019-5782"
},
{
"category": "external",
"summary": "SUSE Bug 1123641 for CVE-2019-5782",
"url": "https://bugzilla.suse.com/1123641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5782"
},
{
"cve": "CVE-2019-5784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5784"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect handling of deferred code in V8 in Google Chrome prior to 72.0.3626.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5784",
"url": "https://www.suse.com/security/cve/CVE-2019-5784"
},
{
"category": "external",
"summary": "SUSE Bug 1124936 for CVE-2019-5784",
"url": "https://bugzilla.suse.com/1124936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromedriver-72.0.3626.96-bp150.2.32.1.x86_64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.aarch64",
"SUSE Package Hub 15:chromium-72.0.3626.96-bp150.2.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-02-19T10:08:13Z",
"details": "important"
}
],
"title": "CVE-2019-5784"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.