{"affected":[{"ecosystem_specific":{"binaries":[{"chromedriver":"77.0.3865.75-bp150.231.1","chromium":"77.0.3865.75-bp150.231.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15","name":"chromium","purl":"pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"77.0.3865.75-bp150.231.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for chromium fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-5870: Fixed a use-after-free in media. (boo#1150425)\n- CVE-2019-5871: Fixed a heap overflow in Skia. (boo#1150425)\n- CVE-2019-5872: Fixed a use-after-free in Mojo (boo#1150425)\n- CVE-2019-5874: Fixed a behavior that made external URIs trigger other browsers. (boo#1150425)\n- CVE-2019-5875: Fixed a URL bar spoof via download redirect. (boo#1150425)\n- CVE-2019-5876: Fixed a use-after-free in media (boo#1150425)\n- CVE-2019-5877: Fixed an out-of-bounds access in V8. (boo#1150425)\n- CVE-2019-5878: Fixed a use-after-free in V8. (boo#1150425)\n- CVE-2019-5879: Fixed an extension issue that allowed the bypass of a same origin policy. (boo#1150425)\n- CVE-2019-5880: Fixed a SameSite cookie bypass. (boo#1150425)\n- CVE-2019-5881: Fixed an arbitrary read in SwiftShader. (boo#1150425)\n- CVE-2019-13659: Fixed an URL spoof. (boo#1150425)\n- CVE-2019-13660: Fixed a full screen notification overlap. (boo#1150425)\n- CVE-2019-13661: Fixed a full screen notification spoof. (boo#1150425)\n- CVE-2019-13662: Fixed a CSP bypass. (boo#1150425)\n- CVE-2019-13663: Fixed an IDN spoof. (boo#1150425)\n- CVE-2019-13664: Fixed a CSRF bypass. (boo#1150425)\n- CVE-2019-13665: Fixed a multiple file download protection bypass. (boo#1150425)\n- CVE-2019-13666: Fixed a side channel weakness using storage size estimate. (boo#1150425)\n- CVE-2019-13667: Fixed a URI bar spoof when using external app URIs. (boo#1150425)\n- CVE-2019-13668: Fixed a global window leak via console. (boo#1150425)\n- CVE-2019-13669: Fixed an HTTP authentication spoof. (boo#1150425)\n- CVE-2019-13670: Fixed a V8 memory corruption in regex. (boo#1150425)\n- CVE-2019-13671: Fixed a dialog box that failed to show the origin. (boo#1150425)\n- CVE-2019-13673: Fixed a cross-origin information leak using devtools. (boo#1150425)\n- CVE-2019-13674: Fixed an IDN spoofing opportunity. (boo#1150425)\n- CVE-2019-13675: Fixed an error that allowed extensions to be disabled by trailing slash. (boo#1150425)\n- CVE-2019-13676: Fixed a mistakenly shown Google URI in certificate warnings. (boo#1150425)\n- CVE-2019-13677: Fixed a lack of isolation in Chrome web store origin. (boo#1150425)\n- CVE-2019-13678: Fixed a download dialog spoofing opportunity. (boo#1150425)\n- CVE-2019-13679: Fixed a the necessity of a user gesture for printing. (boo#1150425)\n- CVE-2019-13680: Fixed an IP address spoofing error. (boo#1150425)\n- CVE-2019-13681: Fixed a bypass on download restrictions. (boo#1150425)\n- CVE-2019-13682: Fixed a site isolation bypass. (boo#1150425)\n- CVE-2019-13683: Fixed an exception leaked by devtools. (boo#1150425)\n\nThis update was imported from the openSUSE:Leap:15.0:Update update project.","id":"openSUSE-SU-2019:2155-1","modified":"2019-09-20T08:46:30Z","published":"2019-09-20T08:46:30Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J3PR5XSONUWMXGMA4ENPYA6AHEES7VD4/#J3PR5XSONUWMXGMA4ENPYA6AHEES7VD4"},{"type":"REPORT","url":"https://bugzilla.suse.com/1150425"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13659"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13661"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13662"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13665"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13666"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13667"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13671"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13674"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13680"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-13683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5874"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5875"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5876"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5878"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-5881"}],"related":["CVE-2019-13659","CVE-2019-13660","CVE-2019-13661","CVE-2019-13662","CVE-2019-13663","CVE-2019-13664","CVE-2019-13665","CVE-2019-13666","CVE-2019-13667","CVE-2019-13668","CVE-2019-13669","CVE-2019-13670","CVE-2019-13671","CVE-2019-13673","CVE-2019-13674","CVE-2019-13675","CVE-2019-13676","CVE-2019-13677","CVE-2019-13678","CVE-2019-13679","CVE-2019-13680","CVE-2019-13681","CVE-2019-13682","CVE-2019-13683","CVE-2019-5870","CVE-2019-5871","CVE-2019-5872","CVE-2019-5874","CVE-2019-5875","CVE-2019-5876","CVE-2019-5877","CVE-2019-5878","CVE-2019-5879","CVE-2019-5880","CVE-2019-5881"],"summary":"Security update for chromium","upstream":["CVE-2019-13659","CVE-2019-13660","CVE-2019-13661","CVE-2019-13662","CVE-2019-13663","CVE-2019-13664","CVE-2019-13665","CVE-2019-13666","CVE-2019-13667","CVE-2019-13668","CVE-2019-13669","CVE-2019-13670","CVE-2019-13671","CVE-2019-13673","CVE-2019-13674","CVE-2019-13675","CVE-2019-13676","CVE-2019-13677","CVE-2019-13678","CVE-2019-13679","CVE-2019-13680","CVE-2019-13681","CVE-2019-13682","CVE-2019-13683","CVE-2019-5870","CVE-2019-5871","CVE-2019-5872","CVE-2019-5874","CVE-2019-5875","CVE-2019-5876","CVE-2019-5877","CVE-2019-5878","CVE-2019-5879","CVE-2019-5880","CVE-2019-5881"]}