Upstream information
CVE-2019-13754 at MITRE
Description
Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
CVSS v2 Scores
| National Vulnerability Database |
Base Score | 4.3 |
Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
CVSS v3 Scores
| National Vulnerability Database |
Base Score | 4.3 |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality Impact | None |
Integrity Impact | Low |
Availability Impact | None |
CVSSv3 Version | 3.1 |
SUSE Bugzilla entry:
1158982 [RESOLVED / FIXED]
SUSE Security Advisories:
List of released packages
Product(s) | Fixed package version(s) | References |
SUSE CaaS Platform 4.0 | qemu >= 3.1.1.1-150100.80.51.5
qemu-audio-alsa >= 3.1.1.1-150100.80.51.5
qemu-audio-oss >= 3.1.1.1-150100.80.51.5
qemu-audio-pa >= 3.1.1.1-150100.80.51.5
qemu-block-curl >= 3.1.1.1-150100.80.51.5
qemu-block-iscsi >= 3.1.1.1-150100.80.51.5
qemu-block-rbd >= 3.1.1.1-150100.80.51.5
qemu-block-ssh >= 3.1.1.1-150100.80.51.5
qemu-guest-agent >= 3.1.1.1-150100.80.51.5
qemu-ipxe >= 1.0.0+-150100.80.51.5
qemu-kvm >= 3.1.1.1-150100.80.51.5
qemu-lang >= 3.1.1.1-150100.80.51.5
qemu-seabios >= 1.12.0_0_ga698c89-150100.80.51.5
qemu-sgabios >= 8-150100.80.51.5
qemu-tools >= 3.1.1.1-150100.80.51.5
qemu-ui-curses >= 3.1.1.1-150100.80.51.5
qemu-ui-gtk >= 3.1.1.1-150100.80.51.5
qemu-vgabios >= 1.12.0_0_ga698c89-150100.80.51.5
qemu-x86 >= 3.1.1.1-150100.80.51.5
| Patchnames: SUSE-SUSE-CAASP-4.0-2023-3800 |
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS | qemu >= 3.1.1.1-150100.80.51.5
qemu-arm >= 3.1.1.1-150100.80.51.5
qemu-audio-alsa >= 3.1.1.1-150100.80.51.5
qemu-audio-oss >= 3.1.1.1-150100.80.51.5
qemu-audio-pa >= 3.1.1.1-150100.80.51.5
qemu-block-curl >= 3.1.1.1-150100.80.51.5
qemu-block-iscsi >= 3.1.1.1-150100.80.51.5
qemu-block-rbd >= 3.1.1.1-150100.80.51.5
qemu-block-ssh >= 3.1.1.1-150100.80.51.5
qemu-guest-agent >= 3.1.1.1-150100.80.51.5
qemu-ipxe >= 1.0.0+-150100.80.51.5
qemu-kvm >= 3.1.1.1-150100.80.51.5
qemu-lang >= 3.1.1.1-150100.80.51.5
qemu-seabios >= 1.12.0_0_ga698c89-150100.80.51.5
qemu-sgabios >= 8-150100.80.51.5
qemu-tools >= 3.1.1.1-150100.80.51.5
qemu-ui-curses >= 3.1.1.1-150100.80.51.5
qemu-ui-gtk >= 3.1.1.1-150100.80.51.5
qemu-vgabios >= 1.12.0_0_ga698c89-150100.80.51.5
qemu-x86 >= 3.1.1.1-150100.80.51.5
| Patchnames: SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3800 |
SUSE Linux Enterprise Server 15 SP1-LTSS | qemu >= 3.1.1.1-150100.80.51.5
qemu-arm >= 3.1.1.1-150100.80.51.5
qemu-audio-alsa >= 3.1.1.1-150100.80.51.5
qemu-audio-oss >= 3.1.1.1-150100.80.51.5
qemu-audio-pa >= 3.1.1.1-150100.80.51.5
qemu-block-curl >= 3.1.1.1-150100.80.51.5
qemu-block-iscsi >= 3.1.1.1-150100.80.51.5
qemu-block-rbd >= 3.1.1.1-150100.80.51.5
qemu-block-ssh >= 3.1.1.1-150100.80.51.5
qemu-guest-agent >= 3.1.1.1-150100.80.51.5
qemu-ipxe >= 1.0.0+-150100.80.51.5
qemu-kvm >= 3.1.1.1-150100.80.51.5
qemu-lang >= 3.1.1.1-150100.80.51.5
qemu-ppc >= 3.1.1.1-150100.80.51.5
qemu-s390 >= 3.1.1.1-150100.80.51.5
qemu-seabios >= 1.12.0_0_ga698c89-150100.80.51.5
qemu-sgabios >= 8-150100.80.51.5
qemu-tools >= 3.1.1.1-150100.80.51.5
qemu-ui-curses >= 3.1.1.1-150100.80.51.5
qemu-ui-gtk >= 3.1.1.1-150100.80.51.5
qemu-vgabios >= 1.12.0_0_ga698c89-150100.80.51.5
qemu-x86 >= 3.1.1.1-150100.80.51.5
| Patchnames: SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3800 |
SUSE Linux Enterprise Server for SAP Applications 15 SP1 | qemu >= 3.1.1.1-150100.80.51.5
qemu-audio-alsa >= 3.1.1.1-150100.80.51.5
qemu-audio-oss >= 3.1.1.1-150100.80.51.5
qemu-audio-pa >= 3.1.1.1-150100.80.51.5
qemu-block-curl >= 3.1.1.1-150100.80.51.5
qemu-block-iscsi >= 3.1.1.1-150100.80.51.5
qemu-block-rbd >= 3.1.1.1-150100.80.51.5
qemu-block-ssh >= 3.1.1.1-150100.80.51.5
qemu-guest-agent >= 3.1.1.1-150100.80.51.5
qemu-ipxe >= 1.0.0+-150100.80.51.5
qemu-kvm >= 3.1.1.1-150100.80.51.5
qemu-lang >= 3.1.1.1-150100.80.51.5
qemu-ppc >= 3.1.1.1-150100.80.51.5
qemu-seabios >= 1.12.0_0_ga698c89-150100.80.51.5
qemu-sgabios >= 8-150100.80.51.5
qemu-tools >= 3.1.1.1-150100.80.51.5
qemu-ui-curses >= 3.1.1.1-150100.80.51.5
qemu-ui-gtk >= 3.1.1.1-150100.80.51.5
qemu-vgabios >= 1.12.0_0_ga698c89-150100.80.51.5
qemu-x86 >= 3.1.1.1-150100.80.51.5
| Patchnames: SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3800 |
SUSE Package Hub 12 SP3 | chromedriver >= 79.0.3945.79-19.1
chromium >= 79.0.3945.79-19.1
| Patchnames: openSUSE-2019-2692 |
SUSE Package Hub 15 SP1 | chromedriver >= 79.0.3945.79-bp151.3.35.1
chromium >= 79.0.3945.79-bp151.3.35.1
| Patchnames: openSUSE-2019-2694 |
SUSE Package Hub 15 | chromedriver >= 79.0.3945.79-bp150.252.1
chromium >= 79.0.3945.79-bp150.252.1
| Patchnames: openSUSE-2019-2692 |
openSUSE Leap 15.1 | chromedriver >= 79.0.3945.79-lp151.2.51.1
chromium >= 79.0.3945.79-lp151.2.51.1
| Patchnames: openSUSE-2019-2692 |
openSUSE Leap 15.2 | chromium >= 83.0.4103.97-lp152.1.1
| Patchnames: openSUSE Leap 15.2 GA chromium-83.0.4103.97-lp152.1.1 |
openSUSE Leap 15.3 | chromium >= 90.0.4430.212-bp153.1.1
| Patchnames: openSUSE Leap 15.3 GA chromium-90.0.4430.212-bp153.1.1 |
openSUSE Leap 15.4 | chromium >= 101.0.4951.64-bp154.1.2
| Patchnames: openSUSE Leap 15.4 GA chromium-101.0.4951.64-bp154.1.2 |
openSUSE Tumbleweed | chromedriver >= 93.0.4577.82-1.1
chromium >= 93.0.4577.82-1.1
ungoogled-chromium >= 113.0.5672.92-1.1
ungoogled-chromium-chromedriver >= 113.0.5672.92-1.1
| Patchnames: openSUSE-Tumbleweed-2024-10681 openSUSE-Tumbleweed-2024-12948 |
SUSE Timeline for this CVE
CVE page created: Wed Dec 11 09:05:58 2019
CVE page last modified: Tue Sep 3 19:13:48 2024