ALT-BU-2019-3884-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2019-02995
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02996
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03595
Уязвимость функции net/url языка программирования GO, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-14809
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2130
- RHSA-2019:3433
- RHSA-2019:3433
- https://github.com/golang/go/issues/29098
- https://github.com/golang/go/issues/29098
- https://groups.google.com/forum/#%21topic/golang-announce/0uuMm1BwpHE
- https://groups.google.com/forum/#%21topic/golang-announce/0uuMm1BwpHE
- https://groups.google.com/forum/#%21topic/golang-announce/65QixT3tcmg
- https://groups.google.com/forum/#%21topic/golang-announce/65QixT3tcmg
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-55d101a740
- FEDORA-2019-55d101a740
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- DSA-4503
- DSA-4503
Modified: 2024-11-21
CVE-2019-9512
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2130
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- RHSA-2019:2594
- RHSA-2019:2661
- RHSA-2019:2682
- RHSA-2019:2690
- RHSA-2019:2726
- RHSA-2019:2766
- RHSA-2019:2769
- RHSA-2019:2796
- RHSA-2019:2861
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3131
- RHSA-2019:3245
- RHSA-2019:3265
- RHSA-2019:3892
- RHSA-2019:3906
- RHSA-2019:4018
- RHSA-2019:4019
- RHSA-2019:4020
- RHSA-2019:4021
- RHSA-2019:4040
- RHSA-2019:4041
- RHSA-2019:4042
- RHSA-2019:4045
- RHSA-2019:4269
- RHSA-2019:4273
- RHSA-2019:4352
- RHSA-2020:0406
- RHSA-2020:0727
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-55d101a740
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- https://security.netapp.com/advisory/ntap-20190823-0001/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K98053339
- https://support.f5.com/csp/article/K98053339?utm_source=f5support&%3Butm_medium=RSS
- USN-4308-1
- DSA-4503
- DSA-4508
- DSA-4520
- https://www.synology.com/security/advisory/Synology_SA_19_33
- DSA-4520
- DSA-4508
- DSA-4503
- USN-4308-1
- https://support.f5.com/csp/article/K98053339?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K98053339
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0001/
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-6a2980de56
- FEDORA-2019-65db7ad6c7
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2020:0727
- RHSA-2020:0406
- RHSA-2019:4352
- RHSA-2019:4273
- RHSA-2019:4269
- RHSA-2019:4045
- RHSA-2019:4042
- RHSA-2019:4041
- RHSA-2019:4040
- RHSA-2019:4021
- RHSA-2019:4020
- RHSA-2019:4019
- RHSA-2019:4018
- RHSA-2019:3906
- RHSA-2019:3892
- RHSA-2019:3265
- RHSA-2019:3245
- RHSA-2019:3131
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2861
- RHSA-2019:2796
- RHSA-2019:2769
- RHSA-2019:2766
- RHSA-2019:2726
- RHSA-2019:2690
- RHSA-2019:2682
- RHSA-2019:2661
- RHSA-2019:2594
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2000
Modified: 2024-11-21
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2130
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- [oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations
- RHSA-2019:2594
- RHSA-2019:2661
- RHSA-2019:2682
- RHSA-2019:2690
- RHSA-2019:2726
- RHSA-2019:2766
- RHSA-2019:2769
- RHSA-2019:2796
- RHSA-2019:2861
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3131
- RHSA-2019:3245
- RHSA-2019:3265
- RHSA-2019:3892
- RHSA-2019:3906
- RHSA-2019:4018
- RHSA-2019:4019
- RHSA-2019:4020
- RHSA-2019:4021
- RHSA-2019:4040
- RHSA-2019:4041
- RHSA-2019:4042
- RHSA-2019:4045
- RHSA-2019:4269
- RHSA-2019:4273
- RHSA-2019:4352
- RHSA-2020:0406
- RHSA-2020:0727
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-55d101a740
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- https://security.netapp.com/advisory/ntap-20190823-0001/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K01988340
- https://support.f5.com/csp/article/K01988340?utm_source=f5support&%3Butm_medium=RSS
- USN-4308-1
- DSA-4503
- DSA-4508
- DSA-4520
- DSA-4669
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2000
- https://www.synology.com/security/advisory/Synology_SA_19_33
- DSA-4669
- DSA-4520
- DSA-4508
- DSA-4503
- USN-4308-1
- https://support.f5.com/csp/article/K01988340?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K01988340
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0001/
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-6a2980de56
- FEDORA-2019-65db7ad6c7
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2020:0727
- RHSA-2020:0406
- RHSA-2019:4352
- RHSA-2019:4273
- RHSA-2019:4269
- RHSA-2019:4045
- RHSA-2019:4042
- RHSA-2019:4041
- RHSA-2019:4040
- RHSA-2019:4021
- RHSA-2019:4020
- RHSA-2019:4019
- RHSA-2019:4018
- RHSA-2019:3906
- RHSA-2019:3892
- RHSA-2019:3265
- RHSA-2019:3245
- RHSA-2019:3131
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2861
- RHSA-2019:2796
- RHSA-2019:2769
- RHSA-2019:2766
- RHSA-2019:2726
- RHSA-2019:2690
- RHSA-2019:2682
- RHSA-2019:2661
- RHSA-2019:2594
- [oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2056
Package LibreOffice-still updated to version 6.2.6.2-alt1 for branch p9 in task 236299.
Closed vulnerabilities
BDU:2019-02759
Уязвимость программного модуля LibreLogo пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2019-02924
Уязвимость режима stealth mode пакета офисных программ LibreOffice, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03147
Уязвимость программного модуля LibreLogo пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2019-03148
Уязвимость программного модуля LibreLogo пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2019-03149
Уязвимость программного модуля LibreLogo пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код в целевой системе
Modified: 2024-11-21
CVE-2019-9848
LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- 109374
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- FEDORA-2019-5561d20558
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- GLSA-201908-13
- USN-4063-1
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9848
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9848
- USN-4063-1
- GLSA-201908-13
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- FEDORA-2019-5561d20558
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- 109374
- openSUSE-SU-2019:2183
Modified: 2024-11-21
CVE-2019-9849
LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- 109374
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- FEDORA-2019-5561d20558
- GLSA-201908-13
- USN-4063-1
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9849
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9849
- USN-4063-1
- GLSA-201908-13
- FEDORA-2019-5561d20558
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- 109374
- openSUSE-SU-2019:2183
Modified: 2024-11-21
CVE-2019-9850
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- FEDORA-2019-dd9d207c17
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- USN-4102-1
- DSA-4501
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850
- DSA-4501
- USN-4102-1
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- FEDORA-2019-dd9d207c17
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- openSUSE-SU-2019:2183
Modified: 2024-11-21
CVE-2019-9851
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- USN-4102-1
- DSA-4501
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851
- DSA-4501
- USN-4102-1
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html
- openSUSE-SU-2019:2183
Modified: 2024-11-21
CVE-2019-9852
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- 20190910 [SECURITY] [DSA 4519-1] libreoffice security update
- USN-4102-1
- DSA-4501
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852
- DSA-4501
- USN-4102-1
- 20190910 [SECURITY] [DSA 4519-1] libreoffice security update
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- openSUSE-SU-2019:2183
Package nvidia-settings updated to version 430.40-alt2 for branch p9 in task 236310.
Closed bugs
NVCtrl.o собран без -fPIC
Closed vulnerabilities
BDU:2019-02737
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании
BDU:2019-02738
Уязвимость браузера Google Chrome, связанная с размерами шрифтов, позволяющая злоумышленнику получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2019-02855
Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2019-02859
Уязвимость средства автономного извлечения страниц веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-02860
Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2019-02861
Уязвимость веб-браузера Google Chrome, связанная с ошибками при проверке длины регулярного выражения (RegExp), позволяющая нарушителю вызвать повреждение памяти
BDU:2019-02862
Уязвимость компонента offline audio context веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2019-02863
Уязвимость реализации протокола WebUSB веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2019-02864
Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02865
Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02886
Уязвимость реализации протокола res веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный JavaScript-код
BDU:2019-02887
Уязвимость функции изоляции сайтов (Site Isolation) веб-браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2019-02888
Уязвимость службы Open URL веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к системе
BDU:2019-02889
Уязвимость веб-браузера Google Chrome, связанная с некорректной фильтрацией портов в CORS, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2019-02890
Уязвимость компонента AppCache веб-браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2020-01415
Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, вызвать отказ в обслуживании или получить несанкционированный доступ к конфиденциальной информации
BDU:2020-01417
Уязвимость компонента ANGLE веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, вызвать отказ в обслуживании или получить несанкционированный доступ к конфиденциальной информации
BDU:2020-01420
Уязвимость компонента API расширений веб-браузера Google Chrome, позволяющая нарушителю установить вредоносное расширение
BDU:2020-01421
Уязвимость компонента URL парсера веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-01669
Уязвимость ядра отображения веб-страниц Blink браузера Google Chrome, связанная с неправильным ограничением отображаемых фреймов пользовательского интерфейса, позволяющая нарушителю нарушить целостность данных
BDU:2020-01670
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01679
Уязвимость компонента Skia браузера Google Chrome, связанная с чтением за допустимыми границами буфера данных, позволяющая злоумышленнику получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-01682
Уязвимость хранилища веб-браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить доступ к конфиденциальной информации, вызвать отказ в обслуживании и оказать воздействие на доступность информации
BDU:2020-01683
Уязвимость обработчика JavaScript-сценариев браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая злоумышленнику получить несанкционированный доступ к защищаемой информации
BDU:2020-01723
Уязвимость система высокопроизводительного рендеринга SwiftShader браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-01771
Уязвимость компонента Service Worker веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, вызвать отказ в обслуживании или получить несанкционированный доступ к конфиденциальной информации
BDU:2020-01772
Уязвимость диспетчера загрузки веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, вызвать отказ в обслуживании или получить несанкционированный доступ к конфиденциальной информации
BDU:2020-01773
Уязвимость компонента COPS веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальной информации
BDU:2020-01774
Уязвимость компонента XMLHttpRequest веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальной информации
BDU:2020-01776
Уязвимость компонента Blink веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-01778
Уязвимость компонента Blink веб-браузера Google Chrome, связанная утечкой информации при взаимодействии, позволяющая нарушителю получить несанкционированный доступ к конфиденциальной информации
BDU:2022-06133
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-5828
Object lifecycle issue in ServiceWorker in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/956597
- https://crbug.com/956597
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
Modified: 2024-11-21
CVE-2019-5829
Integer overflow in download manager in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/958533
- https://crbug.com/958533
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
Modified: 2024-11-21
CVE-2019-5830
Insufficient policy enforcement in CORS in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/665766
- https://crbug.com/665766
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
Modified: 2024-11-21
CVE-2019-5831
Object lifecycle issue in V8 in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/950328
- https://crbug.com/950328
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0791
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0791
Modified: 2024-11-21
CVE-2019-5832
Insufficient policy enforcement in XMLHttpRequest in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/959390
- https://crbug.com/959390
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
Modified: 2024-11-21
CVE-2019-5834
Insufficient data validation in Blink in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/962368
- https://crbug.com/962368
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
Modified: 2024-11-21
CVE-2019-5835
Object lifecycle issue in SwiftShader in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/939239
- https://crbug.com/939239
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- GLSA-201908-18
- GLSA-201908-18
Modified: 2024-11-21
CVE-2019-5836
Heap buffer overflow in ANGLE in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/947342
- https://crbug.com/947342
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
Modified: 2024-11-21
CVE-2019-5837
Resource size information leakage in Blink in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/918293
- https://crbug.com/918293
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
Modified: 2024-11-21
CVE-2019-5838
Insufficient policy enforcement in extensions API in Google Chrome prior to 75.0.3770.80 allowed an attacker who convinced a user to install a malicious extension to bypass restrictions on file URIs via a crafted Chrome Extension.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/893087
- https://crbug.com/893087
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
Modified: 2024-11-21
CVE-2019-5839
Excessive data validation in URL parser in Google Chrome prior to 75.0.3770.80 allowed a remote attacker who convinced a user to input a URL to bypass website URL validation via a crafted URL.
- openSUSE-SU-2019:1666
- openSUSE-SU-2019:1666
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
- https://crbug.com/925614
- https://crbug.com/925614
- FEDORA-2019-a1af621faf
- FEDORA-2019-a1af621faf
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-e5ff5d0ffd
- FEDORA-2019-8fb8240d14
- FEDORA-2019-8fb8240d14
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- 20190813 [SECURITY] [DSA 4500-1] chromium security update
- GLSA-201908-18
- GLSA-201908-18
- DSA-4500
- DSA-4500
Modified: 2024-11-21
CVE-2019-5841
Out of bounds memory access in JavaScript in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5842
Use after free in Blink in Google Chrome prior to 75.0.3770.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5847
Inappropriate implementation in JavaScript in Google Chrome prior to 75.0.3770.142 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5848
Incorrect font handling in autofill in Google Chrome prior to 75.0.3770.142 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5849
Out of bounds read in Skia in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5850
Use after free in offline mode in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5851
Use after free in WebAudio in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5852
Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5853
Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5854
Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Modified: 2024-11-21
CVE-2019-5855
Integer overflow in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Modified: 2024-11-21
CVE-2019-5856
Insufficient policy enforcement in storage in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5857
Inappropriate implementation in JavaScript in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5858
Incorrect security UI in MacOS services integration in Google Chrome on OS X prior to 76.0.3809.87 allowed a local attacker to execute arbitrary code via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5859
Insufficient filtering in URI schemes in Google Chrome on Windows prior to 76.0.3809.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5860
Use after free in PDFium in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Modified: 2024-11-21
CVE-2019-5861
Insufficient data validation in Blink in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to bypass anti-clickjacking policy via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5862
Insufficient data validation in AppCache in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
Modified: 2023-11-07
CVE-2019-5863
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Modified: 2024-11-21
CVE-2019-5864
Insufficient data validation in CORS in Google Chrome prior to 76.0.3809.87 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension.
Modified: 2024-11-21
CVE-2019-5865
Insufficient policy enforcement in navigations in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-5866
Out of bounds memory access in JavaScript in Google Chrome prior to 75.0.3770.142 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.