Lucene search

K
suseSuseOPENSUSE-SU-2019:1849-1
HistoryAug 12, 2019 - 12:00 a.m.

Security update for chromium (important)

2019-08-1200:00:00
lists.opensuse.org
69

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

57.6%

An update that fixes 16 vulnerabilities is now available.

Description:

This update for chromium to version 76.0.3809.87 fixes the following
issues:

  • CVE-2019-5850: Use-after-free in offline page fetcher (boo#1143492)
  • CVE-2019-5860: Use-after-free in PDFium (boo#1143492)
  • CVE-2019-5853: Memory corruption in regexp length check (boo#1143492)
  • CVE-2019-5851: Use-after-poison in offline audio context (boo#1143492)
  • CVE-2019-5859: res: URIs can load alternative browsers (boo#1143492)
  • CVE-2019-5856: Insufficient checks on filesystem: URI permissions
    (boo#1143492)
  • CVE-2019-5855: Integer overflow in PDFium (boo#1143492)
  • CVE-2019-5865: Site isolation bypass from compromised renderer
    (boo#1143492)
  • CVE-2019-5858: Insufficient filtering of Open URL service parameters
    (boo#1143492)
  • CVE-2019-5864: Insufficient port filtering in CORS for extensions
    (boo#1143492)
  • CVE-2019-5862: AppCache not robust to compromised renderers (boo#1143492)
  • CVE-2019-5861: Click location incorrectly checked (boo#1143492)
  • CVE-2019-5857: Comparison of -0 and null yields crash (boo#1143492)
  • CVE-2019-5854: Integer overflow in PDFium text rendering (boo#1143492)
  • CVE-2019-5852: Object leak of utility functions (boo#1143492)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.1:

    zypper in -t patch openSUSE-2019-1849=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.1x86_64< - openSUSE Leap 15.1 (x86_64):- openSUSE Leap 15.1 (x86_64):.x86_64.rpm

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

57.6%