Upstream information

CVE-2019-5864 at MITRE

Description

Insufficient data validation in CORS in Google Chrome prior to 76.0.3809.87 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

SUSE Bugzilla entry: 1143492 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub for SUSE Linux Enterprise 12 SP3
  • chromedriver >= 78.0.3904.87-10.1
  • chromium >= 78.0.3904.87-10.1
Patchnames:
openSUSE-2019-2447
openSUSE Leap 15.0
  • chromedriver >= 76.0.3809.87-lp150.224.1
  • chromedriver-debuginfo >= 76.0.3809.87-lp150.224.1
  • chromium >= 76.0.3809.87-lp150.224.1
  • chromium-debuginfo >= 76.0.3809.87-lp150.224.1
  • chromium-debugsource >= 76.0.3809.87-lp150.224.1
Patchnames:
openSUSE-2019-1848
openSUSE Leap 15.1
  • chromedriver >= 76.0.3809.87-lp151.2.15.1
  • chromedriver-debuginfo >= 76.0.3809.87-lp151.2.15.1
  • chromium >= 76.0.3809.87-lp151.2.15.1
  • chromium-debuginfo >= 76.0.3809.87-lp151.2.15.1
  • chromium-debugsource >= 76.0.3809.87-lp151.2.15.1
Patchnames:
openSUSE-2019-1849