CVE-2019-5844
https://notcve.org/view.php?id=CVE-2019-5844
Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Un acceso fuera de límites en SwiftShader en Google Chrome versiones anteriores a la versión 73.0.3683.75, permitió a un atacante remoto explotar potencialmente una corrupción de la pila por medio de una página HTML especialmente diseñada. • http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop_12.html https://crbug.com/915206 • CWE-787: Out-of-bounds Write •
CVE-2019-13767 – chromium-browser: Use after free in media picker
https://notcve.org/view.php?id=CVE-2019-13767
Use after free in media picker in Google Chrome prior to 79.0.3945.88 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. Un uso de la memoria previamente liberada en media picker en Google Chrome versiones anteriores a la versión 79.0.3945.88, permitió a un atacante remoto que ha comprometido el proceso del renderizador explotar potencialmente una corrupción de la pila por medio de una página HTML especialmente diseñada. Chrome suffers from a heap use-after-free vulnerability in DesktopMediaPickerController::WebContentsDestroyed. • http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00005.html http://packetstormsecurity.com/files/156563/Chrome-DesktopMediaPickerController-WebContentsDestroyed-Use-After-Free.html https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop_17.html https://crbug.com/1031653 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK https://seclists.org/bugtraq/2020/Jan/27 https://security.gentoo.org/glsa/202003-08 https:/& • CWE-416: Use After Free CWE-787: Out-of-bounds Write •
CVE-2019-20009
https://notcve.org/view.php?id=CVE-2019-20009
An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec. Se detectó un problema en GNU LibreDWG versiones anteriores a 0.93. Una entrada diseñada conllevará a un intento de asignación de memoria excesiva en la función dwg_decode_SPLINE_private en el archivo dwg.spec. • http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html https://github.com/LibreDWG/libredwg/compare/0.9.2...0.9.3 https://github.com/LibreDWG/libredwg/issues/176 https://github.com/LibreDWG/libredwg/issues/176#issue-541977765 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2019-20011
https://notcve.org/view.php?id=CVE-2019-20011
An issue was discovered in GNU LibreDWG 0.92. There is a heap-based buffer over-read in decode_R13_R2000 in decode.c. Se detectó un problema en GNU LibreDWG versión 0.92. Se presenta una lectura excesiva del búfer en la región heap de la memoria en la función decode_R13_R2000 en el archivo decode.c. • http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html https://github.com/LibreDWG/libredwg/issues/176 https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439 • CWE-125: Out-of-bounds Read •
CVE-2019-20012
https://notcve.org/view.php?id=CVE-2019-20012
An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_HATCH_private in dwg.spec. Se detectó un problema en GNU LibreDWG versión 0.92. Una entrada diseñada conllevará a un intento de asignación de memoria excesiva en la función dwg_decode_HATCH_private en el archivo dwg.spec. • http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html https://github.com/LibreDWG/libredwg/issues/176 https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088 • CWE-770: Allocation of Resources Without Limits or Throttling •