5.1
CVSSv2

CVE-2019-5796

Published: 23/05/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 515
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Data race in extensions guest view in Google Chrome before 73.0.3683.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

opensuse leap 42.3

opensuse leap 15.0

opensuse leap 15.1

opensuse backports sle 15.0

Vendor Advisories

Synopsis Important: chromium-browser security update Type/Severity Security Advisory: Important Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Several vulnerabilities have been discovered in the chromium web browser CVE-2019-5787 Zhe Jin discovered a use-after-free issue CVE-2019-5788 Mark Brand discovered a use-after-free issue in the FileAPI implementation CVE-2019-5789 Mark Brand discovered a use-after-free issue in the WebMIDI implementation CVE-2019-5790 ...
A race condition has been found in the Extensions component of the chromium browser before 730368375 ...
The Chrome team is delighted to announce the promotion of Chrome 73 to the stable channel for Windows, Mac and Linux This will roll out over the coming days/weeks Chrome 730368375 contains a number of fixes and improvements -- a list of changes is available in the log Watch out for upcoming Chrome and Chromium blog po ...

Exploits

There appears to be a race condition in the destruction of the ExtensionsGuestViewMessageFilter if the ProcessIdToFilterMap is modified concurrently See the comment in the code: ExtensionsGuestViewMessageFilter::~ExtensionsGuestViewMessageFilter() { DCHECK_CURRENTLY_ON(BrowserThread::IO); // This map is created and accessed on the UI thread ...