CVE-2019-5798

Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:12

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html -
References (UBUNTU) https://usn.ubuntu.com/3997-1/ - Third Party Advisory () https://usn.ubuntu.com/3997-1/ -
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html -
References (MISC) https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html - Release Notes, Vendor Advisory () https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html -
References (MISC) https://crbug.com/883596 - Exploit, Issue Tracking, Third Party Advisory () https://crbug.com/883596 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html -
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1308 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1308 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html -
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1310 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1310 -
References (DEBIAN) https://www.debian.org/security/2019/dsa-4451 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4451 -
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1309 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1309 -
References (BUGTRAQ) https://seclists.org/bugtraq/2019/May/67 - Issue Tracking, Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/May/67 -

11 Oct 2022, 14:30

Type Values Removed Values Added
First Time Redhat
Suse package Hub
Canonical ubuntu Linux
Canonical
Opensuse backports
Opensuse leap
Suse
Redhat enterprise Linux
Opensuse
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html - Mailing List, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/May/67 - Third Party Advisory (BUGTRAQ) https://seclists.org/bugtraq/2019/May/67 - Issue Tracking, Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1310 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1310 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html - Third Party Advisory (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1308 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1308 - Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/3997-1/ - (UBUNTU) https://usn.ubuntu.com/3997-1/ - Third Party Advisory
References (MISC) https://crbug.com/883596 - Exploit, Third Party Advisory (MISC) https://crbug.com/883596 - Exploit, Issue Tracking, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1309 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1309 - Third Party Advisory
CPE cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Information

Published : 2019-05-23 20:29

Updated : 2023-12-10 12:59


NVD link : CVE-2019-5798

Mitre link : CVE-2019-5798

CVE.ORG link : CVE-2019-5798


JSON object : View

Products Affected

suse

  • package_hub

redhat

  • enterprise_linux

canonical

  • ubuntu_linux

debian

  • debian_linux

opensuse

  • backports
  • leap

google

  • chrome
CWE
CWE-125

Out-of-bounds Read