CVE-2019-5827

Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html Mailing List Patch Third Party Advisory
https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html Vendor Advisory
https://crbug.com/952406 Exploit Issue Tracking Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/
https://seclists.org/bugtraq/2019/Aug/19 Issue Tracking Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202003-16 Third Party Advisory
https://usn.ubuntu.com/4205-1/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4500 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html Mailing List Patch Third Party Advisory
https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html Vendor Advisory
https://crbug.com/952406 Exploit Issue Tracking Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/
https://seclists.org/bugtraq/2019/Aug/19 Issue Tracking Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202003-16 Third Party Advisory
https://usn.ubuntu.com/4205-1/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4500 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

History

21 Nov 2024, 04:45

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html - Mailing List, Patch, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html - Mailing List, Patch, Third Party Advisory
References () https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html - Vendor Advisory () https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html - Vendor Advisory
References () https://crbug.com/952406 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://crbug.com/952406 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/ -
References () https://seclists.org/bugtraq/2019/Aug/19 - Issue Tracking, Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Aug/19 - Issue Tracking, Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202003-16 - Third Party Advisory () https://security.gentoo.org/glsa/202003-16 - Third Party Advisory
References () https://usn.ubuntu.com/4205-1/ - Third Party Advisory () https://usn.ubuntu.com/4205-1/ - Third Party Advisory
References () https://www.debian.org/security/2019/dsa-4500 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4500 - Third Party Advisory

07 Nov 2023, 03:12

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/', 'name': 'FEDORA-2019-a1af621faf', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/', 'name': 'FEDORA-2019-8fb8240d14', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/ -

Information

Published : 2019-06-27 17:15

Updated : 2024-11-21 04:45


NVD link : CVE-2019-5827

Mitre link : CVE-2019-5827

CVE.ORG link : CVE-2019-5827


JSON object : View

Products Affected

google

  • chrome

canonical

  • ubuntu_linux

opensuse

  • leap
  • backports

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-190

Integer Overflow or Wraparound

CWE-787

Out-of-bounds Write