Unrated severityNVD Advisory· Published Feb 19, 2019· Updated Aug 4, 2024
CVE-2019-5754
CVE-2019-5754
Description
Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy.
Affected products
3- osv-coords2 versionspkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2012%20SP2pkg:rpm/suse/chromium&distro=SUSE%20Package%20Hub%2015
< 72.0.3626.96-88.1+ 1 more
- (no CPE)range: < 72.0.3626.96-88.1
- (no CPE)range: < 72.0.3626.96-bp150.2.32.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- access.redhat.com/errata/RHSA-2019:0309mitrevendor-advisoryx_refsource_REDHAT
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/mitrevendor-advisoryx_refsource_FEDORA
- www.debian.org/security/2019/dsa-4395mitrevendor-advisoryx_refsource_DEBIAN
- www.securityfocus.com/bid/106767mitrevdb-entryx_refsource_BID
- chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.htmlmitrex_refsource_CONFIRM
- crbug.com/914497mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.