Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-13688 (GCVE-0-2019-13688)
Vulnerability from cvelistv5 – Published: 2019-11-25 14:22 – Updated: 2024-08-04 23:57
VLAI?
EPSS
Summary
Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Severity ?
No CVSS data available.
CWE
- Use after free
Assigner
References
2 references
| URL | Tags |
|---|---|
| https://chromereleases.googleblog.com/2019/09/sta… | x_refsource_MISC |
| https://crbug.com/995964 | x_refsource_MISC |
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:57:39.567Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://crbug.com/995964"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "77.0.3865.90",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Use after free",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-25T14:22:54.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://crbug.com/995964"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2019-13688",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "77.0.3865.90"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
},
{
"name": "https://crbug.com/995964",
"refsource": "MISC",
"url": "https://crbug.com/995964"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2019-13688",
"datePublished": "2019-11-25T14:22:54.000Z",
"dateReserved": "2019-07-18T00:00:00.000Z",
"dateUpdated": "2024-08-04T23:57:39.567Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-13688",
"date": "2026-05-19",
"epss": "0.00356",
"percentile": "0.57958"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"77.0.3865.90\", \"matchCriteriaId\": \"82C71E46-65EE-44B1-AE37-C1DF49D3810D\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"}, {\"lang\": \"es\", \"value\": \"Un uso de la memoria previamente liberada en Blink en Google Chrome versiones anteriores a 77.0.3865.90, permiti\\u00f3 a un atacante remoto explotar potencialmente una corrupci\\u00f3n de la pila por medio de una p\\u00e1gina HTML dise\\u00f1ada.\"}]",
"id": "CVE-2019-13688",
"lastModified": "2024-11-21T04:25:30.730",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-11-25T15:15:31.950",
"references": "[{\"url\": \"https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://crbug.com/995964\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://crbug.com/995964\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-13688\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2019-11-25T15:15:31.950\",\"lastModified\":\"2024-11-21T04:25:30.730\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Un uso de la memoria previamente liberada en Blink en Google Chrome versiones anteriores a 77.0.3865.90, permiti\u00f3 a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"77.0.3865.90\",\"matchCriteriaId\":\"82C71E46-65EE-44B1-AE37-C1DF49D3810D\"}]}]}],\"references\":[{\"url\":\"https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://crbug.com/995964\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://crbug.com/995964\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2019-AVI-449
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 77.0.3865.90 sur Windows, Mac et Linux",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-13686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13686"
},
{
"name": "CVE-2019-13688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13688"
},
{
"name": "CVE-2019-13685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13685"
},
{
"name": "CVE-2019-13687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13687"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-449",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 18 septembre 2019",
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
}
]
}
CERTFR-2019-AVI-449
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 77.0.3865.90 sur Windows, Mac et Linux",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-13686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13686"
},
{
"name": "CVE-2019-13688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13688"
},
{
"name": "CVE-2019-13685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13685"
},
{
"name": "CVE-2019-13687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13687"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-449",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 18 septembre 2019",
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
}
]
}
BDU:2020-01606
Vulnerability from fstec - Published: 22.10.2019
VLAI Severity ?
Title
Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
Description
Уязвимость модуля отображения Blink браузера Google Chrome связана с использованием памяти после освобождения. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, получить несанкционированный доступ к информации и нарушить ее целостность и доступность при помощи специально созданной HTML-страницы
Severity ?
Vendor
Сообщество свободного программного обеспечения, ООО «РусБИТех-Астра», Red Hat Inc., Novell Inc., Google Inc, АО «ИВК», АО «Концерн ВНИИНС»
Software Name
Debian GNU/Linux, Astra Linux Special Edition (запись в едином реестре российских программ №369), Red Hat Enterprise Linux, OpenSUSE Leap, SUSE Package Hub for SUSE Linux Enterprise, Google Chrome, Альт 8 СП (запись в едином реестре российских программ №4305), ОС ОН «Стрелец» (запись в едином реестре российских программ №6177)
Software Version
9 (Debian GNU/Linux), 1.6 «Смоленск» (Astra Linux Special Edition), Desktop 6.0 (Red Hat Enterprise Linux), Server 6.0 (Red Hat Enterprise Linux), Workstation 6.0 (Red Hat Enterprise Linux), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 12 SP3 (SUSE Package Hub for SUSE Linux Enterprise), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), до 77.0.3865.90 (Google Chrome), - (Альт 8 СП), до 16.01.2023 (ОС ОН «Стрелец»)
Possible Mitigations
Использование рекомендаций:
Для chromium:
https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html
Для Debian:
https://security-tracker.debian.org/tracker/CVE-2019-13688
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2019-13688/
Для программных продуктов Red Hat Inc.:
https://access.redhat.com/security/cve/CVE-2019-13688
Для ОС ОН «Стрелец»:
Обновление программного обеспечения chromium до версии 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets
Для ОС Альт 8 СП: установка обновления из публичного репозитория программного средства
Для ОС Astra Linux 1.6 «Смоленск»:
обновить пакет chromium до 80.0.3987.87-1astra3 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20200327SE16
Reference
https://www.suse.com/security/cve/CVE-2019-13688/
https://access.redhat.com/security/cve/CVE-2019-13688
https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html
https://nvd.nist.gov/vuln/detail/CVE-2019-13688
https://security-tracker.debian.org/tracker/CVE-2019-13688
https://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023
https://altsp.su/obnovleniya-bezopasnosti/
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16
CWE
CWE-416
{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Red Hat Inc., Novell Inc., Google Inc, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), Desktop 6.0 (Red Hat Enterprise Linux), Server 6.0 (Red Hat Enterprise Linux), Workstation 6.0 (Red Hat Enterprise Linux), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 12 SP3 (SUSE Package Hub for SUSE Linux Enterprise), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), \u0434\u043e 77.0.3865.90 (Google Chrome), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f chromium:\nhttps://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html\n\n\u0414\u043b\u044f Debian:\nhttps://security-tracker.debian.org/tracker/CVE-2019-13688\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2019-13688/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2019-13688\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 chromium \u0434\u043e 80.0.3987.87-1astra3 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20200327SE16",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "22.10.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "30.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.04.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-01606",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-13688",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Enterprise Linux, OpenSUSE Leap, SUSE Package Hub for SUSE Linux Enterprise, Google Chrome, \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Inc. Red Hat Enterprise Linux Desktop 6.0 , Red Hat Inc. Red Hat Enterprise Linux Server 6.0 , Red Hat Inc. Red Hat Enterprise Linux Workstation 6.0 , Novell Inc. OpenSUSE Leap 15.0 , Novell Inc. OpenSUSE Leap 15.1 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f Blink \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0435\u0435 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f Blink \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0435\u0435 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0439 HTML-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.suse.com/security/cve/CVE-2019-13688/\nhttps://access.redhat.com/security/cve/CVE-2019-13688\nhttps://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-13688\nhttps://security-tracker.debian.org/tracker/CVE-2019-13688\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,3)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}
FKIE_CVE-2019-13688
Vulnerability from fkie_nvd - Published: 2019-11-25 15:15 - Updated: 2024-11-21 04:25
Severity ?
Summary
Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82C71E46-65EE-44B1-AE37-C1DF49D3810D",
"versionEndExcluding": "77.0.3865.90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
},
{
"lang": "es",
"value": "Un uso de la memoria previamente liberada en Blink en Google Chrome versiones anteriores a 77.0.3865.90, permiti\u00f3 a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada."
}
],
"id": "CVE-2019-13688",
"lastModified": "2024-11-21T04:25:30.730",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-25T15:15:31.950",
"references": [
{
"source": "chrome-cve-admin@google.com",
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://crbug.com/995964"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://crbug.com/995964"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-RHMF-XRPG-5WJ8
Vulnerability from github – Published: 2022-05-24 17:01 – Updated: 2022-05-24 17:01
VLAI?
Details
Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
{
"affected": [],
"aliases": [
"CVE-2019-13688"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-11-25T15:15:00Z",
"severity": "MODERATE"
},
"details": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GHSA-rhmf-xrpg-5wj8",
"modified": "2022-05-24T17:01:55Z",
"published": "2022-05-24T17:01:55Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13688"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
},
{
"type": "WEB",
"url": "https://crbug.com/995964"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2019-13688
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-13688",
"description": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2019-13688",
"references": [
"https://www.suse.com/security/cve/CVE-2019-13688.html",
"https://www.debian.org/security/2019/dsa-4562",
"https://access.redhat.com/errata/RHSA-2019:3211",
"https://advisories.mageia.org/CVE-2019-13688.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-13688"
],
"details": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"id": "GSD-2019-13688",
"modified": "2023-12-13T01:23:41.330214Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2019-13688",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "77.0.3865.90"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Use after free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
},
{
"name": "https://crbug.com/995964",
"refsource": "MISC",
"url": "https://crbug.com/995964"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "77.0.3865.90",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2019-13688"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2019/09/stable-channel-update-for-desktop_18.html"
},
{
"name": "https://crbug.com/995964",
"refsource": "MISC",
"tags": [
"Permissions Required"
],
"url": "https://crbug.com/995964"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-11-27T01:00Z",
"publishedDate": "2019-11-25T15:15Z"
}
}
}
OPENSUSE-SU-2019:2186-1
Vulnerability from csaf_opensuse - Published: 2019-09-25 08:19 - Updated: 2019-09-25 08:19Summary
Security update for chromium
Severity
Important
Notes
Title of the patch: Security update for chromium
Description of the patch: This update for chromium to version 77.0.3865.90 fixes the following issues:
- CVE-2019-13685: Fixed a use-after-free in UI. (boo#1151229)
- CVE-2019-13688: Fixed a use-after-free in media. (boo#1151229)
- CVE-2019-13687: Fixed a use-after-free in media. (boo#1151229)
- CVE-2019-13686: Fixed a use-after-free in offline pages. (boo#1151229)
Patchnames: openSUSE-2019-2186
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
17 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium to version 77.0.3865.90 fixes the following issues:\n\n- CVE-2019-13685: Fixed a use-after-free in UI. (boo#1151229)\n- CVE-2019-13688: Fixed a use-after-free in media. (boo#1151229)\n- CVE-2019-13687: Fixed a use-after-free in media. (boo#1151229)\n- CVE-2019-13686: Fixed a use-after-free in offline pages. (boo#1151229)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2186",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2186-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2186-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXJU7DKTKJI3DCEMC4XK5SZTAI2NKA5J/#ZXJU7DKTKJI3DCEMC4XK5SZTAI2NKA5J"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2186-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXJU7DKTKJI3DCEMC4XK5SZTAI2NKA5J/#ZXJU7DKTKJI3DCEMC4XK5SZTAI2NKA5J"
},
{
"category": "self",
"summary": "SUSE Bug 1151229",
"url": "https://bugzilla.suse.com/1151229"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13685 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13686 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13687 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13687/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13688 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13688/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2019-09-25T08:19:49Z",
"generator": {
"date": "2019-09-25T08:19:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2186-1",
"initial_release_date": "2019-09-25T08:19:49Z",
"revision_history": [
{
"date": "2019-09-25T08:19:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"product": {
"name": "chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"product_id": "chromedriver-77.0.3865.90-lp151.2.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"product": {
"name": "chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"product_id": "chromium-77.0.3865.90-lp151.2.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64"
},
"product_reference": "chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-77.0.3865.90-lp151.2.33.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
},
"product_reference": "chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-77.0.3865.90-lp151.2.33.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64"
},
"product_reference": "chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-77.0.3865.90-lp151.2.33.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
},
"product_reference": "chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13685"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13685",
"url": "https://www.suse.com/security/cve/CVE-2019-13685"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13685",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-25T08:19:49Z",
"details": "important"
}
],
"title": "CVE-2019-13685"
},
{
"cve": "CVE-2019-13686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13686"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13686",
"url": "https://www.suse.com/security/cve/CVE-2019-13686"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13686",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-25T08:19:49Z",
"details": "important"
}
],
"title": "CVE-2019-13686"
},
{
"cve": "CVE-2019-13687",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13687"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13687",
"url": "https://www.suse.com/security/cve/CVE-2019-13687"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13687",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-25T08:19:49Z",
"details": "important"
}
],
"title": "CVE-2019-13687"
},
{
"cve": "CVE-2019-13688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13688"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13688",
"url": "https://www.suse.com/security/cve/CVE-2019-13688"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13688",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.0:chromium-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromedriver-77.0.3865.90-lp151.2.33.1.x86_64",
"openSUSE Leap 15.1:chromium-77.0.3865.90-lp151.2.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-09-25T08:19:49Z",
"details": "important"
}
],
"title": "CVE-2019-13688"
}
]
}
OPENSUSE-SU-2019:2228-1
Vulnerability from csaf_opensuse - Published: 2019-10-01 08:20 - Updated: 2019-10-01 08:20Summary
Security update for chromium
Severity
Important
Notes
Title of the patch: Security update for chromium
Description of the patch: This update for chromium to version 77.0.3865.90 fixes the following issues:
- CVE-2019-13685: Fixed a use-after-free in UI. (boo#1151229)
- CVE-2019-13688: Fixed a use-after-free in media. (boo#1151229)
- CVE-2019-13687: Fixed a use-after-free in media. (boo#1151229)
- CVE-2019-13686: Fixed a use-after-free in offline pages. (boo#1151229)
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patchnames: openSUSE-2019-2228
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
17 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium to version 77.0.3865.90 fixes the following issues:\n\n- CVE-2019-13685: Fixed a use-after-free in UI. (boo#1151229)\n- CVE-2019-13688: Fixed a use-after-free in media. (boo#1151229)\n- CVE-2019-13687: Fixed a use-after-free in media. (boo#1151229)\n- CVE-2019-13686: Fixed a use-after-free in offline pages. (boo#1151229)\n\nThis update was imported from the openSUSE:Leap:15.0:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2228",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2228-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2228-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPFFZ7TQ7QHJJBTLV3BE3ORPPMG3MXDO/#QPFFZ7TQ7QHJJBTLV3BE3ORPPMG3MXDO"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2228-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPFFZ7TQ7QHJJBTLV3BE3ORPPMG3MXDO/#QPFFZ7TQ7QHJJBTLV3BE3ORPPMG3MXDO"
},
{
"category": "self",
"summary": "SUSE Bug 1151229",
"url": "https://bugzilla.suse.com/1151229"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13685 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13686 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13687 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13687/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13688 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13688/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2019-10-01T08:20:14Z",
"generator": {
"date": "2019-10-01T08:20:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2228-1",
"initial_release_date": "2019-10-01T08:20:14Z",
"revision_history": [
{
"date": "2019-10-01T08:20:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"product": {
"name": "chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"product_id": "chromedriver-77.0.3865.90-bp150.234.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-77.0.3865.90-bp150.234.1.aarch64",
"product": {
"name": "chromium-77.0.3865.90-bp150.234.1.aarch64",
"product_id": "chromium-77.0.3865.90-bp150.234.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"product": {
"name": "chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"product_id": "chromedriver-77.0.3865.90-bp150.234.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-77.0.3865.90-bp150.234.1.x86_64",
"product": {
"name": "chromium-77.0.3865.90-bp150.234.1.x86_64",
"product_id": "chromium-77.0.3865.90-bp150.234.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15",
"product": {
"name": "SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-77.0.3865.90-bp150.234.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64"
},
"product_reference": "chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-77.0.3865.90-bp150.234.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64"
},
"product_reference": "chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-77.0.3865.90-bp150.234.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64"
},
"product_reference": "chromium-77.0.3865.90-bp150.234.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-77.0.3865.90-bp150.234.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
},
"product_reference": "chromium-77.0.3865.90-bp150.234.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13685"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13685",
"url": "https://www.suse.com/security/cve/CVE-2019-13685"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13685",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-01T08:20:14Z",
"details": "important"
}
],
"title": "CVE-2019-13685"
},
{
"cve": "CVE-2019-13686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13686"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13686",
"url": "https://www.suse.com/security/cve/CVE-2019-13686"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13686",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-01T08:20:14Z",
"details": "important"
}
],
"title": "CVE-2019-13686"
},
{
"cve": "CVE-2019-13687",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13687"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13687",
"url": "https://www.suse.com/security/cve/CVE-2019-13687"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13687",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-01T08:20:14Z",
"details": "important"
}
],
"title": "CVE-2019-13687"
},
{
"cve": "CVE-2019-13688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13688"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13688",
"url": "https://www.suse.com/security/cve/CVE-2019-13688"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13688",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromedriver-77.0.3865.90-bp150.234.1.x86_64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.aarch64",
"SUSE Package Hub 15:chromium-77.0.3865.90-bp150.234.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-01T08:20:14Z",
"details": "important"
}
],
"title": "CVE-2019-13688"
}
]
}
OPENSUSE-SU-2019:2229-1
Vulnerability from csaf_opensuse - Published: 2019-10-01 08:20 - Updated: 2019-10-01 08:20Summary
Security update for chromium
Severity
Important
Notes
Title of the patch: Security update for chromium
Description of the patch: This update for chromium to version 77.0.3865.90 fixes the following issues:
- CVE-2019-13685: Fixed a use-after-free in UI. (boo#1151229)
- CVE-2019-13688: Fixed a use-after-free in media. (boo#1151229)
- CVE-2019-13687: Fixed a use-after-free in media. (boo#1151229)
- CVE-2019-13686: Fixed a use-after-free in offline pages. (boo#1151229)
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patchnames: openSUSE-2019-2229
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
17 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium to version 77.0.3865.90 fixes the following issues:\n\n- CVE-2019-13685: Fixed a use-after-free in UI. (boo#1151229)\n- CVE-2019-13688: Fixed a use-after-free in media. (boo#1151229)\n- CVE-2019-13687: Fixed a use-after-free in media. (boo#1151229)\n- CVE-2019-13686: Fixed a use-after-free in offline pages. (boo#1151229)\n\nThis update was imported from the openSUSE:Leap:15.1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2229",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2229-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2229-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRSO73SWQZP5EW6DC2XDHC6MAN2ZGIJX/#WRSO73SWQZP5EW6DC2XDHC6MAN2ZGIJX"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2229-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRSO73SWQZP5EW6DC2XDHC6MAN2ZGIJX/#WRSO73SWQZP5EW6DC2XDHC6MAN2ZGIJX"
},
{
"category": "self",
"summary": "SUSE Bug 1151229",
"url": "https://bugzilla.suse.com/1151229"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13685 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13686 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13687 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13687/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13688 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13688/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2019-10-01T08:20:36Z",
"generator": {
"date": "2019-10-01T08:20:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2229-1",
"initial_release_date": "2019-10-01T08:20:36Z",
"revision_history": [
{
"date": "2019-10-01T08:20:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"product": {
"name": "chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"product_id": "chromedriver-77.0.3865.90-bp151.3.15.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"product": {
"name": "chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"product_id": "chromium-77.0.3865.90-bp151.3.15.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"product": {
"name": "chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"product_id": "chromedriver-77.0.3865.90-bp151.3.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-77.0.3865.90-bp151.3.15.1.x86_64",
"product": {
"name": "chromium-77.0.3865.90-bp151.3.15.1.x86_64",
"product_id": "chromium-77.0.3865.90-bp151.3.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP1",
"product": {
"name": "SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-77.0.3865.90-bp151.3.15.1.aarch64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64"
},
"product_reference": "chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-77.0.3865.90-bp151.3.15.1.x86_64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64"
},
"product_reference": "chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-77.0.3865.90-bp151.3.15.1.aarch64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64"
},
"product_reference": "chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-77.0.3865.90-bp151.3.15.1.x86_64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
},
"product_reference": "chromium-77.0.3865.90-bp151.3.15.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13685"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13685",
"url": "https://www.suse.com/security/cve/CVE-2019-13685"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13685",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-01T08:20:36Z",
"details": "important"
}
],
"title": "CVE-2019-13685"
},
{
"cve": "CVE-2019-13686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13686"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13686",
"url": "https://www.suse.com/security/cve/CVE-2019-13686"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13686",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-01T08:20:36Z",
"details": "important"
}
],
"title": "CVE-2019-13686"
},
{
"cve": "CVE-2019-13687",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13687"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13687",
"url": "https://www.suse.com/security/cve/CVE-2019-13687"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13687",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-01T08:20:36Z",
"details": "important"
}
],
"title": "CVE-2019-13687"
},
{
"cve": "CVE-2019-13688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13688"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13688",
"url": "https://www.suse.com/security/cve/CVE-2019-13688"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13688",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-77.0.3865.90-bp151.3.15.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-77.0.3865.90-bp151.3.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-01T08:20:36Z",
"details": "important"
}
],
"title": "CVE-2019-13688"
}
]
}
OPENSUSE-SU-2019:2447-1
Vulnerability from csaf_opensuse - Published: 2019-11-06 17:25 - Updated: 2019-11-06 17:25Summary
Security update for chromium
Severity
Important
Notes
Title of the patch: Security update for chromium
Description of the patch: This update for chromium fixes the following issues:
Chromium was updated to 78.0.3904.87:
(boo#1155643,boo#1154806,boo#1153660, boo#1151229,boo#1149143,boo#1145242,boo#1143492)
Security issues fixed with this version update:
* CVE-2019-13721: Use-after-free in PDFium
* CVE-2019-13720: Use-after-free in audio
* CVE-2019-13699: Use-after-free in media
* CVE-2019-13700: Buffer overrun in Blink
* CVE-2019-13701: URL spoof in navigation
* CVE-2019-13702: Privilege elevation in Installer
* CVE-2019-13703: URL bar spoofing
* CVE-2019-13704: CSP bypass
* CVE-2019-13705: Extension permission bypass
* CVE-2019-13706: Out-of-bounds read in PDFium
* CVE-2019-13707: File storage disclosure
* CVE-2019-13708: HTTP authentication spoof
* CVE-2019-13709: File download protection bypass
* CVE-2019-13710: File download protection bypass
* CVE-2019-13711: Cross-context information leak
* CVE-2019-15903: Buffer overflow in expat
* CVE-2019-13713: Cross-origin data leak
* CVE-2019-13714: CSS injection
* CVE-2019-13715: Address bar spoofing
* CVE-2019-13716: Service worker state error
* CVE-2019-13717: Notification obscured
* CVE-2019-13718: IDN spoof
* CVE-2019-13719: Notification obscured
* CVE-2019-13693: Use-after-free in IndexedDB
* CVE-2019-13694: Use-after-free in WebRTC
* CVE-2019-13695: Use-after-free in audio
* CVE-2019-13696: Use-after-free in V8
* CVE-2019-13697: Cross-origin size leak.
* CVE-2019-13685: Use-after-free in UI
* CVE-2019-13688: Use-after-free in media
* CVE-2019-13687: Use-after-free in media
* CVE-2019-13686: Use-after-free in offline pages
* CVE-2019-5870: Use-after-free in media
* CVE-2019-5871: Heap overflow in Skia
* CVE-2019-5872: Use-after-free in Mojo
* CVE-2019-5874: External URIs may trigger other browsers
* CVE-2019-5875: URL bar spoof via download redirect
* CVE-2019-5876: Use-after-free in media
* CVE-2019-5877: Out-of-bounds access in V8
* CVE-2019-5878: Use-after-free in V8
* CVE-2019-5879: Extension can bypass same origin policy
* CVE-2019-5880: SameSite cookie bypass
* CVE-2019-5881: Arbitrary read in SwiftShader
* CVE-2019-13659: URL spoof
* CVE-2019-13660: Full screen notification overlap
* CVE-2019-13661: Full screen notification spoof
* CVE-2019-13662: CSP bypass
* CVE-2019-13663: IDN spoof
* CVE-2019-13664: CSRF bypass
* CVE-2019-13665: Multiple file download protection bypass
* CVE-2019-13666: Side channel using storage size estimate
* CVE-2019-13667: URI bar spoof when using external app URIs
* CVE-2019-13668: Global window leak via console
* CVE-2019-13669: HTTP authentication spoof
* CVE-2019-13670: V8 memory corruption in regex
* CVE-2019-13671: Dialog box fails to show origin
* CVE-2019-13673: Cross-origin information leak using devtools
* CVE-2019-13674: IDN spoofing
* CVE-2019-13675: Extensions can be disabled by trailing slash
* CVE-2019-13676: Google URI shown for certificate warning
* CVE-2019-13677: Chrome web store origin needs to be isolated
* CVE-2019-13678: Download dialog spoofing
* CVE-2019-13679: User gesture needed for printing
* CVE-2019-13680: IP address spoofing to servers
* CVE-2019-13681: Bypass on download restrictions
* CVE-2019-13682: Site isolation bypass
* CVE-2019-13683: Exceptions leaked by devtools
* CVE-2019-5869: Use-after-free in Blink
* CVE-2019-5868: Use-after-free in PDFium ExecuteFieldAction
* CVE-2019-5867: Out-of-bounds read in V8
* CVE-2019-5850: Use-after-free in offline page fetcher
* CVE-2019-5860: Use-after-free in PDFium
* CVE-2019-5853: Memory corruption in regexp length check
* CVE-2019-5851: Use-after-poison in offline audio context
* CVE-2019-5859: res: URIs can load alternative browsers
* CVE-2019-5856: Insufficient checks on filesystem: URI permissions
* CVE-2019-5855: Integer overflow in PDFium
* CVE-2019-5865: Site isolation bypass from compromised renderer
* CVE-2019-5858: Insufficient filtering of Open URL service parameters
* CVE-2019-5864: Insufficient port filtering in CORS for extensions
* CVE-2019-5862: AppCache not robust to compromised renderers
* CVE-2019-5861: Click location incorrectly checked
* CVE-2019-5857: Comparison of -0 and null yields crash
* CVE-2019-5854: Integer overflow in PDFium text rendering
* CVE-2019-5852: Object leak of utility functions
Patchnames: openSUSE-2019-2447
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.4 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.4 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.4 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.1 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
9.6 (Critical)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
9.6 (Critical)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
critical
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
4.3 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.5 (Medium)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
7.4 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.1 (High)
Affected products
Recommended
4 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
276 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\t \nChromium was updated to 78.0.3904.87: \n(boo#1155643,boo#1154806,boo#1153660, boo#1151229,boo#1149143,boo#1145242,boo#1143492)\n\nSecurity issues fixed with this version update: \n\n * CVE-2019-13721: Use-after-free in PDFium\n * CVE-2019-13720: Use-after-free in audio\n * CVE-2019-13699: Use-after-free in media\n * CVE-2019-13700: Buffer overrun in Blink\n * CVE-2019-13701: URL spoof in navigation\n * CVE-2019-13702: Privilege elevation in Installer\n * CVE-2019-13703: URL bar spoofing\n * CVE-2019-13704: CSP bypass\n * CVE-2019-13705: Extension permission bypass\n * CVE-2019-13706: Out-of-bounds read in PDFium\n * CVE-2019-13707: File storage disclosure\n * CVE-2019-13708: HTTP authentication spoof\n * CVE-2019-13709: File download protection bypass\n * CVE-2019-13710: File download protection bypass\n * CVE-2019-13711: Cross-context information leak\n * CVE-2019-15903: Buffer overflow in expat\n * CVE-2019-13713: Cross-origin data leak\n * CVE-2019-13714: CSS injection\n * CVE-2019-13715: Address bar spoofing\n * CVE-2019-13716: Service worker state error\n * CVE-2019-13717: Notification obscured\n * CVE-2019-13718: IDN spoof\n * CVE-2019-13719: Notification obscured\n * CVE-2019-13693: Use-after-free in IndexedDB\n * CVE-2019-13694: Use-after-free in WebRTC\n * CVE-2019-13695: Use-after-free in audio\n * CVE-2019-13696: Use-after-free in V8\n * CVE-2019-13697: Cross-origin size leak. \n * CVE-2019-13685: Use-after-free in UI\n * CVE-2019-13688: Use-after-free in media\n * CVE-2019-13687: Use-after-free in media\n * CVE-2019-13686: Use-after-free in offline pages\n * CVE-2019-5870: Use-after-free in media\n * CVE-2019-5871: Heap overflow in Skia\n * CVE-2019-5872: Use-after-free in Mojo\n * CVE-2019-5874: External URIs may trigger other browsers\n * CVE-2019-5875: URL bar spoof via download redirect\n * CVE-2019-5876: Use-after-free in media\n * CVE-2019-5877: Out-of-bounds access in V8\n * CVE-2019-5878: Use-after-free in V8\n * CVE-2019-5879: Extension can bypass same origin policy\n * CVE-2019-5880: SameSite cookie bypass\n * CVE-2019-5881: Arbitrary read in SwiftShader\n * CVE-2019-13659: URL spoof\n * CVE-2019-13660: Full screen notification overlap\n * CVE-2019-13661: Full screen notification spoof\n * CVE-2019-13662: CSP bypass\n * CVE-2019-13663: IDN spoof\n * CVE-2019-13664: CSRF bypass\n * CVE-2019-13665: Multiple file download protection bypass\n * CVE-2019-13666: Side channel using storage size estimate\n * CVE-2019-13667: URI bar spoof when using external app URIs\n * CVE-2019-13668: Global window leak via console\n * CVE-2019-13669: HTTP authentication spoof\n * CVE-2019-13670: V8 memory corruption in regex\n * CVE-2019-13671: Dialog box fails to show origin\n * CVE-2019-13673: Cross-origin information leak using devtools\n * CVE-2019-13674: IDN spoofing\n * CVE-2019-13675: Extensions can be disabled by trailing slash\n * CVE-2019-13676: Google URI shown for certificate warning\n * CVE-2019-13677: Chrome web store origin needs to be isolated\n * CVE-2019-13678: Download dialog spoofing\n * CVE-2019-13679: User gesture needed for printing\n * CVE-2019-13680: IP address spoofing to servers\n * CVE-2019-13681: Bypass on download restrictions\n * CVE-2019-13682: Site isolation bypass\n * CVE-2019-13683: Exceptions leaked by devtools\n * CVE-2019-5869: Use-after-free in Blink\n * CVE-2019-5868: Use-after-free in PDFium ExecuteFieldAction\n * CVE-2019-5867: Out-of-bounds read in V8\n * CVE-2019-5850: Use-after-free in offline page fetcher\n * CVE-2019-5860: Use-after-free in PDFium\n * CVE-2019-5853: Memory corruption in regexp length check\n * CVE-2019-5851: Use-after-poison in offline audio context\n * CVE-2019-5859: res: URIs can load alternative browsers\n * CVE-2019-5856: Insufficient checks on filesystem: URI permissions\n * CVE-2019-5855: Integer overflow in PDFium\n * CVE-2019-5865: Site isolation bypass from compromised renderer\n * CVE-2019-5858: Insufficient filtering of Open URL service parameters\n * CVE-2019-5864: Insufficient port filtering in CORS for extensions\n * CVE-2019-5862: AppCache not robust to compromised renderers\n * CVE-2019-5861: Click location incorrectly checked\n * CVE-2019-5857: Comparison of -0 and null yields crash\n * CVE-2019-5854: Integer overflow in PDFium text rendering\n * CVE-2019-5852: Object leak of utility functions\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2447",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2447-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2447-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNJAWHUQKXHQBG3I7GI4ACW3CYHDJAHM/#QNJAWHUQKXHQBG3I7GI4ACW3CYHDJAHM"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2447-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNJAWHUQKXHQBG3I7GI4ACW3CYHDJAHM/#QNJAWHUQKXHQBG3I7GI4ACW3CYHDJAHM"
},
{
"category": "self",
"summary": "SUSE Bug 1143492",
"url": "https://bugzilla.suse.com/1143492"
},
{
"category": "self",
"summary": "SUSE Bug 1144625",
"url": "https://bugzilla.suse.com/1144625"
},
{
"category": "self",
"summary": "SUSE Bug 1145242",
"url": "https://bugzilla.suse.com/1145242"
},
{
"category": "self",
"summary": "SUSE Bug 1146219",
"url": "https://bugzilla.suse.com/1146219"
},
{
"category": "self",
"summary": "SUSE Bug 1149143",
"url": "https://bugzilla.suse.com/1149143"
},
{
"category": "self",
"summary": "SUSE Bug 1150425",
"url": "https://bugzilla.suse.com/1150425"
},
{
"category": "self",
"summary": "SUSE Bug 1151229",
"url": "https://bugzilla.suse.com/1151229"
},
{
"category": "self",
"summary": "SUSE Bug 1153660",
"url": "https://bugzilla.suse.com/1153660"
},
{
"category": "self",
"summary": "SUSE Bug 1154806",
"url": "https://bugzilla.suse.com/1154806"
},
{
"category": "self",
"summary": "SUSE Bug 1155643",
"url": "https://bugzilla.suse.com/1155643"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13659 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13660 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13661 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13662 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13662/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13663 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13664 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13665 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13665/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13667 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13668 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13669 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13670 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13671 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13673 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13674 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13675 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13676 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13676/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13677 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13677/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13678 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13678/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13679 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13680 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13680/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13681 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13681/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13682 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13682/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13683 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13685 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13686 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13687 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13687/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13688 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13693 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13694 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13695 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13696 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13697 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13699 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13699/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13700 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13700/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13701 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13701/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13702 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13703 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13704 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13704/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13705 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13705/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13706 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13706/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13707 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13708 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13709 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13710 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13711 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13713 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13714 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13715 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13716 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13716/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13717 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13718 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13719 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13720 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13721 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15903 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15903/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5850 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5850/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5851 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5852 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5853 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5854 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5854/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5855 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5856 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5857 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5858 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5859 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5860 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5861 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5862 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5863 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5864 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5865 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5867 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5868 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5869 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5870 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5871 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5871/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5872 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5874 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5875 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5876 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5876/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5877 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5877/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5878 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5879 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5880 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5881 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5881/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2019-11-06T17:25:26Z",
"generator": {
"date": "2019-11-06T17:25:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2447-1",
"initial_release_date": "2019-11-06T17:25:26Z",
"revision_history": [
{
"date": "2019-11-06T17:25:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-78.0.3904.87-10.1.aarch64",
"product": {
"name": "chromedriver-78.0.3904.87-10.1.aarch64",
"product_id": "chromedriver-78.0.3904.87-10.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-78.0.3904.87-10.1.aarch64",
"product": {
"name": "chromium-78.0.3904.87-10.1.aarch64",
"product_id": "chromium-78.0.3904.87-10.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-78.0.3904.87-10.1.x86_64",
"product": {
"name": "chromedriver-78.0.3904.87-10.1.x86_64",
"product_id": "chromedriver-78.0.3904.87-10.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-78.0.3904.87-10.1.x86_64",
"product": {
"name": "chromium-78.0.3904.87-10.1.x86_64",
"product_id": "chromium-78.0.3904.87-10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12 SP3",
"product": {
"name": "SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-78.0.3904.87-10.1.aarch64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64"
},
"product_reference": "chromedriver-78.0.3904.87-10.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-78.0.3904.87-10.1.x86_64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64"
},
"product_reference": "chromedriver-78.0.3904.87-10.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-78.0.3904.87-10.1.aarch64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64"
},
"product_reference": "chromium-78.0.3904.87-10.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-78.0.3904.87-10.1.x86_64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
},
"product_reference": "chromium-78.0.3904.87-10.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13659"
}
],
"notes": [
{
"category": "general",
"text": "IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13659",
"url": "https://www.suse.com/security/cve/CVE-2019-13659"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13659",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13659"
},
{
"cve": "CVE-2019-13660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13660"
}
],
"notes": [
{
"category": "general",
"text": "UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13660",
"url": "https://www.suse.com/security/cve/CVE-2019-13660"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13660",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13660"
},
{
"cve": "CVE-2019-13661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13661"
}
],
"notes": [
{
"category": "general",
"text": "UI spoofing in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof notifications via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13661",
"url": "https://www.suse.com/security/cve/CVE-2019-13661"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13661",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13661"
},
{
"cve": "CVE-2019-13662",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13662"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in navigations in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13662",
"url": "https://www.suse.com/security/cve/CVE-2019-13662"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13662",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13662"
},
{
"cve": "CVE-2019-13663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13663"
}
],
"notes": [
{
"category": "general",
"text": "IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13663",
"url": "https://www.suse.com/security/cve/CVE-2019-13663"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13663",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13663"
},
{
"cve": "CVE-2019-13664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13664"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13664",
"url": "https://www.suse.com/security/cve/CVE-2019-13664"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13664",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13664"
},
{
"cve": "CVE-2019-13665",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13665"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient filtering in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass multiple file download protection via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13665",
"url": "https://www.suse.com/security/cve/CVE-2019-13665"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13665",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13665"
},
{
"cve": "CVE-2019-13666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13666"
}
],
"notes": [
{
"category": "general",
"text": "Information leak in storage in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13666",
"url": "https://www.suse.com/security/cve/CVE-2019-13666"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13666",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13666"
},
{
"cve": "CVE-2019-13667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13667"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13667",
"url": "https://www.suse.com/security/cve/CVE-2019-13667"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13667",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13667"
},
{
"cve": "CVE-2019-13668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13668"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13668",
"url": "https://www.suse.com/security/cve/CVE-2019-13668"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13668",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13668"
},
{
"cve": "CVE-2019-13669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13669"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect data validation in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13669",
"url": "https://www.suse.com/security/cve/CVE-2019-13669"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13669",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13669"
},
{
"cve": "CVE-2019-13670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13670"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13670",
"url": "https://www.suse.com/security/cve/CVE-2019-13670"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13670",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13670"
},
{
"cve": "CVE-2019-13671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13671"
}
],
"notes": [
{
"category": "general",
"text": "UI spoofing in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof security UI via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13671",
"url": "https://www.suse.com/security/cve/CVE-2019-13671"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13671",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13671"
},
{
"cve": "CVE-2019-13673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13673"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13673",
"url": "https://www.suse.com/security/cve/CVE-2019-13673"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13673",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13673"
},
{
"cve": "CVE-2019-13674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13674"
}
],
"notes": [
{
"category": "general",
"text": "IDN spoofing in Omnibox in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13674",
"url": "https://www.suse.com/security/cve/CVE-2019-13674"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13674",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13674"
},
{
"cve": "CVE-2019-13675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13675"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in extensions in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to disable extensions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13675",
"url": "https://www.suse.com/security/cve/CVE-2019-13675"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13675",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13675"
},
{
"cve": "CVE-2019-13676",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13676"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Chromium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13676",
"url": "https://www.suse.com/security/cve/CVE-2019-13676"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13676",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13676"
},
{
"cve": "CVE-2019-13677",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13677"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in site isolation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13677",
"url": "https://www.suse.com/security/cve/CVE-2019-13677"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13677",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13677"
},
{
"cve": "CVE-2019-13678",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13678"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13678",
"url": "https://www.suse.com/security/cve/CVE-2019-13678"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13678",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13678"
},
{
"cve": "CVE-2019-13679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13679"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in PDFium in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to show print dialogs via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13679",
"url": "https://www.suse.com/security/cve/CVE-2019-13679"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13679",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13679"
},
{
"cve": "CVE-2019-13680",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13680"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in TLS in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof client IP address to websites via crafted TLS connections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13680",
"url": "https://www.suse.com/security/cve/CVE-2019-13680"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13680",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13680"
},
{
"cve": "CVE-2019-13681",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13681"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass download restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13681",
"url": "https://www.suse.com/security/cve/CVE-2019-13681"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13681",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13681"
},
{
"cve": "CVE-2019-13682",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13682"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in external protocol handling in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to bypass same origin policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13682",
"url": "https://www.suse.com/security/cve/CVE-2019-13682"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13682",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13682"
},
{
"cve": "CVE-2019-13683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13683"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in developer tools in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13683",
"url": "https://www.suse.com/security/cve/CVE-2019-13683"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-13683",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13683"
},
{
"cve": "CVE-2019-13685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13685"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in sharing view in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13685",
"url": "https://www.suse.com/security/cve/CVE-2019-13685"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13685",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13685"
},
{
"cve": "CVE-2019-13686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13686"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in offline mode in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13686",
"url": "https://www.suse.com/security/cve/CVE-2019-13686"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13686",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13686"
},
{
"cve": "CVE-2019-13687",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13687"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13687",
"url": "https://www.suse.com/security/cve/CVE-2019-13687"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13687",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13687"
},
{
"cve": "CVE-2019-13688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13688"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 77.0.3865.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13688",
"url": "https://www.suse.com/security/cve/CVE-2019-13688"
},
{
"category": "external",
"summary": "SUSE Bug 1151229 for CVE-2019-13688",
"url": "https://bugzilla.suse.com/1151229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13688"
},
{
"cve": "CVE-2019-13693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13693"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in IndexedDB in Google Chrome prior to 77.0.3865.120 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13693",
"url": "https://www.suse.com/security/cve/CVE-2019-13693"
},
{
"category": "external",
"summary": "SUSE Bug 1153660 for CVE-2019-13693",
"url": "https://bugzilla.suse.com/1153660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13693"
},
{
"cve": "CVE-2019-13694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13694"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebRTC in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13694",
"url": "https://www.suse.com/security/cve/CVE-2019-13694"
},
{
"category": "external",
"summary": "SUSE Bug 1153660 for CVE-2019-13694",
"url": "https://bugzilla.suse.com/1153660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13694"
},
{
"cve": "CVE-2019-13695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13695"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in audio in Google Chrome on Android prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13695",
"url": "https://www.suse.com/security/cve/CVE-2019-13695"
},
{
"category": "external",
"summary": "SUSE Bug 1153660 for CVE-2019-13695",
"url": "https://bugzilla.suse.com/1153660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13695"
},
{
"cve": "CVE-2019-13696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13696"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in JavaScript in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13696",
"url": "https://www.suse.com/security/cve/CVE-2019-13696"
},
{
"category": "external",
"summary": "SUSE Bug 1153660 for CVE-2019-13696",
"url": "https://bugzilla.suse.com/1153660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13696"
},
{
"cve": "CVE-2019-13697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13697"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in performance APIs in Google Chrome prior to 77.0.3865.120 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13697",
"url": "https://www.suse.com/security/cve/CVE-2019-13697"
},
{
"category": "external",
"summary": "SUSE Bug 1153660 for CVE-2019-13697",
"url": "https://bugzilla.suse.com/1153660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13697"
},
{
"cve": "CVE-2019-13699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13699"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in media in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13699",
"url": "https://www.suse.com/security/cve/CVE-2019-13699"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13699",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13699"
},
{
"cve": "CVE-2019-13700",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13700"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in the gamepad API in Google Chrome prior to 78.0.3904.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13700",
"url": "https://www.suse.com/security/cve/CVE-2019-13700"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13700",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13700"
},
{
"cve": "CVE-2019-13701",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13701"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect implementation in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13701",
"url": "https://www.suse.com/security/cve/CVE-2019-13701"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13701",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13701"
},
{
"cve": "CVE-2019-13702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13702"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in installer in Google Chrome on Windows prior to 78.0.3904.70 allowed a local attacker to perform privilege escalation via a crafted executable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13702",
"url": "https://www.suse.com/security/cve/CVE-2019-13702"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13702",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13702"
},
{
"cve": "CVE-2019-13703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13703"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in the Omnibox in Google Chrome on Android prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13703",
"url": "https://www.suse.com/security/cve/CVE-2019-13703"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13703",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13703"
},
{
"cve": "CVE-2019-13704",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13704"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in navigation in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13704",
"url": "https://www.suse.com/security/cve/CVE-2019-13704"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13704",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13704"
},
{
"cve": "CVE-2019-13705",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13705"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 78.0.3904.70 allowed an attacker who convinced a user to install a malicious extension to leak cross-origin data via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13705",
"url": "https://www.suse.com/security/cve/CVE-2019-13705"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13705",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13705"
},
{
"cve": "CVE-2019-13706",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13706"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in PDFium in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13706",
"url": "https://www.suse.com/security/cve/CVE-2019-13706"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13706",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13706"
},
{
"cve": "CVE-2019-13707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13707"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in intents in Google Chrome on Android prior to 78.0.3904.70 allowed a local attacker to leak files via a crafted application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13707",
"url": "https://www.suse.com/security/cve/CVE-2019-13707"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13707",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13707"
},
{
"cve": "CVE-2019-13708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13708"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in navigation in Google Chrome on iOS prior to 78.0.3904.70 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13708",
"url": "https://www.suse.com/security/cve/CVE-2019-13708"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13708",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13708"
},
{
"cve": "CVE-2019-13709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13709"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13709",
"url": "https://www.suse.com/security/cve/CVE-2019-13709"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13709",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13709"
},
{
"cve": "CVE-2019-13710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13710"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in downloads in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass download restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13710",
"url": "https://www.suse.com/security/cve/CVE-2019-13710"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13710",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13710"
},
{
"cve": "CVE-2019-13711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13711"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13711",
"url": "https://www.suse.com/security/cve/CVE-2019-13711"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13711",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13711"
},
{
"cve": "CVE-2019-13713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13713"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in JavaScript in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13713",
"url": "https://www.suse.com/security/cve/CVE-2019-13713"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13713",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13713"
},
{
"cve": "CVE-2019-13714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13714"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Color Enhancer extension in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to inject CSS into an HTML page via a crafted URL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13714",
"url": "https://www.suse.com/security/cve/CVE-2019-13714"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13714",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13714"
},
{
"cve": "CVE-2019-13715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13715"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13715",
"url": "https://www.suse.com/security/cve/CVE-2019-13715"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13715",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13715"
},
{
"cve": "CVE-2019-13716",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13716"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in service workers in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13716",
"url": "https://www.suse.com/security/cve/CVE-2019-13716"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13716",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13716"
},
{
"cve": "CVE-2019-13717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13717"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13717",
"url": "https://www.suse.com/security/cve/CVE-2019-13717"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13717",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13717"
},
{
"cve": "CVE-2019-13718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13718"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in Omnibox in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13718",
"url": "https://www.suse.com/security/cve/CVE-2019-13718"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13718",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13718"
},
{
"cve": "CVE-2019-13719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13719"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in full screen mode in Google Chrome prior to 78.0.3904.70 allowed a remote attacker to hide security UI via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13719",
"url": "https://www.suse.com/security/cve/CVE-2019-13719"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-13719",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-13719"
},
{
"cve": "CVE-2019-13720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13720"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebAudio in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13720",
"url": "https://www.suse.com/security/cve/CVE-2019-13720"
},
{
"category": "external",
"summary": "SUSE Bug 1155643 for CVE-2019-13720",
"url": "https://bugzilla.suse.com/1155643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13720"
},
{
"cve": "CVE-2019-13721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13721"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PDFium in Google Chrome prior to 78.0.3904.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13721",
"url": "https://www.suse.com/security/cve/CVE-2019-13721"
},
{
"category": "external",
"summary": "SUSE Bug 1155643 for CVE-2019-13721",
"url": "https://bugzilla.suse.com/1155643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-13721"
},
{
"cve": "CVE-2019-15903",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15903"
}
],
"notes": [
{
"category": "general",
"text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15903",
"url": "https://www.suse.com/security/cve/CVE-2019-15903"
},
{
"category": "external",
"summary": "SUSE Bug 1149429 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1149429"
},
{
"category": "external",
"summary": "SUSE Bug 1154738 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154738"
},
{
"category": "external",
"summary": "SUSE Bug 1154806 for CVE-2019-15903",
"url": "https://bugzilla.suse.com/1154806"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-15903"
},
{
"cve": "CVE-2019-5850",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5850"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in offline mode in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5850",
"url": "https://www.suse.com/security/cve/CVE-2019-5850"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5850",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "critical"
}
],
"title": "CVE-2019-5850"
},
{
"cve": "CVE-2019-5851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5851"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebAudio in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5851",
"url": "https://www.suse.com/security/cve/CVE-2019-5851"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5851",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5851"
},
{
"cve": "CVE-2019-5852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5852"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5852",
"url": "https://www.suse.com/security/cve/CVE-2019-5852"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5852",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5852"
},
{
"cve": "CVE-2019-5853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5853"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5853",
"url": "https://www.suse.com/security/cve/CVE-2019-5853"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5853",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5853"
},
{
"cve": "CVE-2019-5854",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5854"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5854",
"url": "https://www.suse.com/security/cve/CVE-2019-5854"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5854",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5854"
},
{
"cve": "CVE-2019-5855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5855"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5855",
"url": "https://www.suse.com/security/cve/CVE-2019-5855"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5855",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5855"
},
{
"cve": "CVE-2019-5856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5856"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in storage in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5856",
"url": "https://www.suse.com/security/cve/CVE-2019-5856"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5856",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5856"
},
{
"cve": "CVE-2019-5857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5857"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5857",
"url": "https://www.suse.com/security/cve/CVE-2019-5857"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5857",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5857"
},
{
"cve": "CVE-2019-5858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5858"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in MacOS services integration in Google Chrome on OS X prior to 76.0.3809.87 allowed a local attacker to execute arbitrary code via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5858",
"url": "https://www.suse.com/security/cve/CVE-2019-5858"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5858",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5858"
},
{
"cve": "CVE-2019-5859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5859"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient filtering in URI schemes in Google Chrome on Windows prior to 76.0.3809.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5859",
"url": "https://www.suse.com/security/cve/CVE-2019-5859"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5859",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5859"
},
{
"cve": "CVE-2019-5860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5860"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5860",
"url": "https://www.suse.com/security/cve/CVE-2019-5860"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5860",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5860"
},
{
"cve": "CVE-2019-5861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5861"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in Blink in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to bypass anti-clickjacking policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5861",
"url": "https://www.suse.com/security/cve/CVE-2019-5861"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5861",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5861"
},
{
"cve": "CVE-2019-5862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5862"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in AppCache in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5862",
"url": "https://www.suse.com/security/cve/CVE-2019-5862"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5862",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5862"
},
{
"cve": "CVE-2019-5863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5863"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5863",
"url": "https://www.suse.com/security/cve/CVE-2019-5863"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5863",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5863"
},
{
"cve": "CVE-2019-5864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5864"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in CORS in Google Chrome prior to 76.0.3809.87 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5864",
"url": "https://www.suse.com/security/cve/CVE-2019-5864"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5864",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5864"
},
{
"cve": "CVE-2019-5865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5865"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in navigations in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5865",
"url": "https://www.suse.com/security/cve/CVE-2019-5865"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5865",
"url": "https://bugzilla.suse.com/1143492"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5865"
},
{
"cve": "CVE-2019-5867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5867"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in JavaScript in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5867",
"url": "https://www.suse.com/security/cve/CVE-2019-5867"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5867",
"url": "https://bugzilla.suse.com/1143492"
},
{
"category": "external",
"summary": "SUSE Bug 1145242 for CVE-2019-5867",
"url": "https://bugzilla.suse.com/1145242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5867"
},
{
"cve": "CVE-2019-5868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5868"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PDFium in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5868",
"url": "https://www.suse.com/security/cve/CVE-2019-5868"
},
{
"category": "external",
"summary": "SUSE Bug 1143492 for CVE-2019-5868",
"url": "https://bugzilla.suse.com/1143492"
},
{
"category": "external",
"summary": "SUSE Bug 1145242 for CVE-2019-5868",
"url": "https://bugzilla.suse.com/1145242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5868"
},
{
"cve": "CVE-2019-5869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5869"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink in Google Chrome prior to 76.0.3809.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5869",
"url": "https://www.suse.com/security/cve/CVE-2019-5869"
},
{
"category": "external",
"summary": "SUSE Bug 1149143 for CVE-2019-5869",
"url": "https://bugzilla.suse.com/1149143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5869"
},
{
"cve": "CVE-2019-5870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5870"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in media in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5870",
"url": "https://www.suse.com/security/cve/CVE-2019-5870"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5870",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "critical"
}
],
"title": "CVE-2019-5870"
},
{
"cve": "CVE-2019-5871",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5871"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Skia in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5871",
"url": "https://www.suse.com/security/cve/CVE-2019-5871"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5871",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5871"
},
{
"cve": "CVE-2019-5872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5872"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Mojo in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5872",
"url": "https://www.suse.com/security/cve/CVE-2019-5872"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5872",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5872"
},
{
"cve": "CVE-2019-5874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5874"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient filtering in URI schemes in Google Chrome on Windows prior to 77.0.3865.75 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5874",
"url": "https://www.suse.com/security/cve/CVE-2019-5874"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5874",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5874"
},
{
"cve": "CVE-2019-5875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5875"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in downloads in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5875",
"url": "https://www.suse.com/security/cve/CVE-2019-5875"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5875",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5875"
},
{
"cve": "CVE-2019-5876",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5876"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in media in Google Chrome on Android prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5876",
"url": "https://www.suse.com/security/cve/CVE-2019-5876"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5876",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5876"
},
{
"cve": "CVE-2019-5877",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5877"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in JavaScript in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5877",
"url": "https://www.suse.com/security/cve/CVE-2019-5877"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5877",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5877"
},
{
"cve": "CVE-2019-5878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5878"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5878",
"url": "https://www.suse.com/security/cve/CVE-2019-5878"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5878",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5878"
},
{
"cve": "CVE-2019-5879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5879"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 77.0.3865.75 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5879",
"url": "https://www.suse.com/security/cve/CVE-2019-5879"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5879",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2019-5879"
},
{
"cve": "CVE-2019-5880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5880"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Blink in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5880",
"url": "https://www.suse.com/security/cve/CVE-2019-5880"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5880",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5880"
},
{
"cve": "CVE-2019-5881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5881"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in SwiftShader in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5881",
"url": "https://www.suse.com/security/cve/CVE-2019-5881"
},
{
"category": "external",
"summary": "SUSE Bug 1150425 for CVE-2019-5881",
"url": "https://bugzilla.suse.com/1150425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-78.0.3904.87-10.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-78.0.3904.87-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-06T17:25:26Z",
"details": "important"
}
],
"title": "CVE-2019-5881"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…