CVE-2019-3836 – gnutls: invalid pointer access upon receiving async handshake messages
https://notcve.org/view.php?id=CVE-2019-3836
It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages. Se descubrió en gnutls, antes de la versión 3.6.7 upstream, que hay un acceso de puntero no inicializado en gnutls, en versiones 3.6.4 o posteriores, que puede desencadenarse por determinados mensajes "post-handshake". A flaw was found in the way gnutls handled malformed TLS 1.3 asynchronous messages. An attacker could use this flaw to crash an application compiled with gnutls via invalid pointer access. • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html https://access.redhat.com/errata/RHSA-2019:3600 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3836 https://gitlab.com/gnutls/gnutls/issues/704 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN https://security.gentoo.org/glsa/201904-14 https://security.netapp.com/advisory/ntap-20190502-0005 https://usn.ubuntu.com/3999-1 https://access. • CWE-456: Missing Initialization of a Variable CWE-824: Access of Uninitialized Pointer •
CVE-2019-5800 – chromium-browser: CSP bypass with blob URL
https://notcve.org/view.php?id=CVE-2019-5800
Insufficient policy enforcement in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page. La insuficiente aplicación de políticas en Blink en Google Chrome antes de la versión 73.0.3683.75, permitió a un atacante remoto eludir la política de seguridad de contenido por medio de una página HTML creada. • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/894228 https://access.redhat.com/security/cve/CVE-2019-5800 https://bugzilla.redhat.com/show_bug.cgi?id=1688202 • CWE-20: Improper Input Validation •
CVE-2019-5791 – chromium-browser: Type confusion in V8
https://notcve.org/view.php?id=CVE-2019-5791
Inappropriate optimization in V8 in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. La optimización inadecuada en V8 en Google Chrome antes de la versión 73.0.3683.75, permitió a un atacante remoto ejecutar una lectura de memoria fuera de límites por medio de una página HTML creada. • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/926651 https://access.redhat.com/security/cve/CVE-2019-5791 https://bugzilla.redhat.com/show_bug.cgi?id=1688193 • CWE-125: Out-of-bounds Read CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2019-5787 – chromium-browser: Use after free in Canvas
https://notcve.org/view.php?id=CVE-2019-5787
Use-after-garbage-collection in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. El uso de memoria después del proceso Garbage-Collection en Blink en Google Chrome antes de la versión 73.0.3683.75, permitió a un atacante remoto explotar potencialmente la corrupción de pila por medio de una página HTML creada. • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/913964 https://access.redhat.com/security/cve/CVE-2019-5787 https://bugzilla.redhat.com/show_bug.cgi?id=1688189 • CWE-416: Use After Free CWE-787: Out-of-bounds Write •
CVE-2019-5802 – chromium-browser: Security UI spoofing
https://notcve.org/view.php?id=CVE-2019-5802
Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page. El manejo inadecuado de los orígenes de descarga en Navigation en Google Chrome antes de la versión 73.0.3683.75, permitió que un atacante remoto ejecutara una suplantación de dominios por medio de una página HTML creada. • http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/632514 https://access.redhat.com/security/cve/CVE-2019-5802 https://bugzilla.redhat.com/show_bug.cgi?id=1688204 •