CVE-2019-5798

Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:45

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html -
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html - () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html -
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html - () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html -
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html - () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html -
References () https://access.redhat.com/errata/RHSA-2019:1308 - () https://access.redhat.com/errata/RHSA-2019:1308 -
References () https://access.redhat.com/errata/RHSA-2019:1309 - () https://access.redhat.com/errata/RHSA-2019:1309 -
References () https://access.redhat.com/errata/RHSA-2019:1310 - () https://access.redhat.com/errata/RHSA-2019:1310 -
References () https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html - () https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html -
References () https://crbug.com/883596 - () https://crbug.com/883596 -
References () https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html - () https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html -
References () https://seclists.org/bugtraq/2019/May/67 - () https://seclists.org/bugtraq/2019/May/67 -
References () https://usn.ubuntu.com/3997-1/ - () https://usn.ubuntu.com/3997-1/ -
References () https://www.debian.org/security/2019/dsa-4451 - () https://www.debian.org/security/2019/dsa-4451 -

07 Nov 2023, 03:12

Type Values Removed Values Added
References (UBUNTU) https://usn.ubuntu.com/3997-1/ - Third Party Advisory () https://usn.ubuntu.com/3997-1/ -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html -
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1309 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1309 -
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html -
References (BUGTRAQ) https://seclists.org/bugtraq/2019/May/67 - Issue Tracking, Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/May/67 -
References (DEBIAN) https://www.debian.org/security/2019/dsa-4451 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4451 -
References (MISC) https://crbug.com/883596 - Exploit, Issue Tracking, Third Party Advisory () https://crbug.com/883596 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html -
References (MISC) https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html - Release Notes, Vendor Advisory () https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html -
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1308 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1308 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html -
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1310 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1310 -

Information

Published : 2019-05-23 20:29

Updated : 2024-11-21 04:45


NVD link : CVE-2019-5798

Mitre link : CVE-2019-5798

CVE.ORG link : CVE-2019-5798


JSON object : View

Products Affected

suse

  • package_hub

debian

  • debian_linux

opensuse

  • leap
  • backports

canonical

  • ubuntu_linux

redhat

  • enterprise_linux

google

  • chrome
CWE
CWE-125

Out-of-bounds Read