Upstream information

CVE-2019-13754 at MITRE

Description

Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
CVSS v3 Scores
  National Vulnerability Database
Base Score 4.3
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality Impact None
Integrity Impact Low
Availability Impact None
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1158982 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE CaaS Platform 4.0
  • qemu >= 3.1.1.1-150100.80.51.5
  • qemu-audio-alsa >= 3.1.1.1-150100.80.51.5
  • qemu-audio-oss >= 3.1.1.1-150100.80.51.5
  • qemu-audio-pa >= 3.1.1.1-150100.80.51.5
  • qemu-block-curl >= 3.1.1.1-150100.80.51.5
  • qemu-block-iscsi >= 3.1.1.1-150100.80.51.5
  • qemu-block-rbd >= 3.1.1.1-150100.80.51.5
  • qemu-block-ssh >= 3.1.1.1-150100.80.51.5
  • qemu-guest-agent >= 3.1.1.1-150100.80.51.5
  • qemu-ipxe >= 1.0.0+-150100.80.51.5
  • qemu-kvm >= 3.1.1.1-150100.80.51.5
  • qemu-lang >= 3.1.1.1-150100.80.51.5
  • qemu-seabios >= 1.12.0_0_ga698c89-150100.80.51.5
  • qemu-sgabios >= 8-150100.80.51.5
  • qemu-tools >= 3.1.1.1-150100.80.51.5
  • qemu-ui-curses >= 3.1.1.1-150100.80.51.5
  • qemu-ui-gtk >= 3.1.1.1-150100.80.51.5
  • qemu-vgabios >= 1.12.0_0_ga698c89-150100.80.51.5
  • qemu-x86 >= 3.1.1.1-150100.80.51.5
Patchnames:
SUSE-SUSE-CAASP-4.0-2023-3800
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
  • qemu >= 3.1.1.1-150100.80.51.5
  • qemu-arm >= 3.1.1.1-150100.80.51.5
  • qemu-audio-alsa >= 3.1.1.1-150100.80.51.5
  • qemu-audio-oss >= 3.1.1.1-150100.80.51.5
  • qemu-audio-pa >= 3.1.1.1-150100.80.51.5
  • qemu-block-curl >= 3.1.1.1-150100.80.51.5
  • qemu-block-iscsi >= 3.1.1.1-150100.80.51.5
  • qemu-block-rbd >= 3.1.1.1-150100.80.51.5
  • qemu-block-ssh >= 3.1.1.1-150100.80.51.5
  • qemu-guest-agent >= 3.1.1.1-150100.80.51.5
  • qemu-ipxe >= 1.0.0+-150100.80.51.5
  • qemu-kvm >= 3.1.1.1-150100.80.51.5
  • qemu-lang >= 3.1.1.1-150100.80.51.5
  • qemu-seabios >= 1.12.0_0_ga698c89-150100.80.51.5
  • qemu-sgabios >= 8-150100.80.51.5
  • qemu-tools >= 3.1.1.1-150100.80.51.5
  • qemu-ui-curses >= 3.1.1.1-150100.80.51.5
  • qemu-ui-gtk >= 3.1.1.1-150100.80.51.5
  • qemu-vgabios >= 1.12.0_0_ga698c89-150100.80.51.5
  • qemu-x86 >= 3.1.1.1-150100.80.51.5
Patchnames:
SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3800
SUSE Linux Enterprise Server 15 SP1-LTSS
  • qemu >= 3.1.1.1-150100.80.51.5
  • qemu-arm >= 3.1.1.1-150100.80.51.5
  • qemu-audio-alsa >= 3.1.1.1-150100.80.51.5
  • qemu-audio-oss >= 3.1.1.1-150100.80.51.5
  • qemu-audio-pa >= 3.1.1.1-150100.80.51.5
  • qemu-block-curl >= 3.1.1.1-150100.80.51.5
  • qemu-block-iscsi >= 3.1.1.1-150100.80.51.5
  • qemu-block-rbd >= 3.1.1.1-150100.80.51.5
  • qemu-block-ssh >= 3.1.1.1-150100.80.51.5
  • qemu-guest-agent >= 3.1.1.1-150100.80.51.5
  • qemu-ipxe >= 1.0.0+-150100.80.51.5
  • qemu-kvm >= 3.1.1.1-150100.80.51.5
  • qemu-lang >= 3.1.1.1-150100.80.51.5
  • qemu-ppc >= 3.1.1.1-150100.80.51.5
  • qemu-s390 >= 3.1.1.1-150100.80.51.5
  • qemu-seabios >= 1.12.0_0_ga698c89-150100.80.51.5
  • qemu-sgabios >= 8-150100.80.51.5
  • qemu-tools >= 3.1.1.1-150100.80.51.5
  • qemu-ui-curses >= 3.1.1.1-150100.80.51.5
  • qemu-ui-gtk >= 3.1.1.1-150100.80.51.5
  • qemu-vgabios >= 1.12.0_0_ga698c89-150100.80.51.5
  • qemu-x86 >= 3.1.1.1-150100.80.51.5
Patchnames:
SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3800
SUSE Linux Enterprise Server for SAP Applications 15 SP1
  • qemu >= 3.1.1.1-150100.80.51.5
  • qemu-audio-alsa >= 3.1.1.1-150100.80.51.5
  • qemu-audio-oss >= 3.1.1.1-150100.80.51.5
  • qemu-audio-pa >= 3.1.1.1-150100.80.51.5
  • qemu-block-curl >= 3.1.1.1-150100.80.51.5
  • qemu-block-iscsi >= 3.1.1.1-150100.80.51.5
  • qemu-block-rbd >= 3.1.1.1-150100.80.51.5
  • qemu-block-ssh >= 3.1.1.1-150100.80.51.5
  • qemu-guest-agent >= 3.1.1.1-150100.80.51.5
  • qemu-ipxe >= 1.0.0+-150100.80.51.5
  • qemu-kvm >= 3.1.1.1-150100.80.51.5
  • qemu-lang >= 3.1.1.1-150100.80.51.5
  • qemu-ppc >= 3.1.1.1-150100.80.51.5
  • qemu-seabios >= 1.12.0_0_ga698c89-150100.80.51.5
  • qemu-sgabios >= 8-150100.80.51.5
  • qemu-tools >= 3.1.1.1-150100.80.51.5
  • qemu-ui-curses >= 3.1.1.1-150100.80.51.5
  • qemu-ui-gtk >= 3.1.1.1-150100.80.51.5
  • qemu-vgabios >= 1.12.0_0_ga698c89-150100.80.51.5
  • qemu-x86 >= 3.1.1.1-150100.80.51.5
Patchnames:
SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3800
SUSE Package Hub 12 SP3
  • chromedriver >= 79.0.3945.79-19.1
  • chromium >= 79.0.3945.79-19.1
Patchnames:
openSUSE-2019-2692
SUSE Package Hub 15 SP1
  • chromedriver >= 79.0.3945.79-bp151.3.35.1
  • chromium >= 79.0.3945.79-bp151.3.35.1
Patchnames:
openSUSE-2019-2694
SUSE Package Hub 15
  • chromedriver >= 79.0.3945.79-bp150.252.1
  • chromium >= 79.0.3945.79-bp150.252.1
Patchnames:
openSUSE-2019-2692
openSUSE Leap 15.1
  • chromedriver >= 79.0.3945.79-lp151.2.51.1
  • chromium >= 79.0.3945.79-lp151.2.51.1
Patchnames:
openSUSE-2019-2692
openSUSE Leap 15.2
  • chromium >= 83.0.4103.97-lp152.1.1
Patchnames:
openSUSE Leap 15.2 GA chromium-83.0.4103.97-lp152.1.1
openSUSE Leap 15.3
  • chromium >= 90.0.4430.212-bp153.1.1
Patchnames:
openSUSE Leap 15.3 GA chromium-90.0.4430.212-bp153.1.1
openSUSE Leap 15.4
  • chromium >= 101.0.4951.64-bp154.1.2
Patchnames:
openSUSE Leap 15.4 GA chromium-101.0.4951.64-bp154.1.2
openSUSE Tumbleweed
  • chromedriver >= 93.0.4577.82-1.1
  • chromium >= 93.0.4577.82-1.1
  • ungoogled-chromium >= 113.0.5672.92-1.1
  • ungoogled-chromium-chromedriver >= 113.0.5672.92-1.1
Patchnames:
openSUSE-Tumbleweed-2024-10681
openSUSE-Tumbleweed-2024-12948


SUSE Timeline for this CVE

CVE page created: Wed Dec 11 09:05:58 2019
CVE page last modified: Tue Sep 3 19:13:48 2024