ArchLinux: 201902-3: chromium: multiple issues

    Date11 Feb 2019
    CategoryArchLinux
    931
    Posted ByLinuxSecurity Advisories
    The package chromium before version 72.0.3626.81-1 is vulnerable to multiple issues including arbitrary code execution, access restriction bypass, content spoofing and insufficient validation.
    Arch Linux Security Advisory ASA-201902-3
    =========================================
    
    Severity: Critical
    Date    : 2019-02-11
    CVE-ID  : CVE-2019-5754 CVE-2019-5755 CVE-2019-5756 CVE-2019-5757
              CVE-2019-5758 CVE-2019-5759 CVE-2019-5760 CVE-2019-5761
              CVE-2019-5762 CVE-2019-5763 CVE-2019-5764 CVE-2019-5765
              CVE-2019-5766 CVE-2019-5767 CVE-2019-5768 CVE-2019-5769
              CVE-2019-5770 CVE-2019-5771 CVE-2019-5772 CVE-2019-5773
              CVE-2019-5774 CVE-2019-5775 CVE-2019-5776 CVE-2019-5777
              CVE-2019-5778 CVE-2019-5779 CVE-2019-5780 CVE-2019-5781
              CVE-2019-5782 CVE-2019-5783
    Package : chromium
    Type    : multiple issues
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-861
    
    Summary
    =======
    
    The package chromium before version 72.0.3626.81-1 is vulnerable to
    multiple issues including arbitrary code execution, access restriction
    bypass, content spoofing and insufficient validation.
    
    Resolution
    ==========
    
    Upgrade to 72.0.3626.81-1.
    
    # pacman -Syu "chromium>=72.0.3626.81-1"
    
    The problems have been fixed upstream in version 72.0.3626.81.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2019-5754 (arbitrary code execution)
    
    A security issue has been found in the QUIC implementation of the
    chromium browser before 72.0.3626.81.
    
    - CVE-2019-5755 (arbitrary code execution)
    
    A security issue has been found in the V8 implementation of the
    chromium browser before 72.0.3626.81.
    
    - CVE-2019-5756 (arbitrary code execution)
    
    A use after free issue has been found in the PDFium component of the
    chromium browser before 72.0.3626.81.
    
    - CVE-2019-5757 (arbitrary code execution)
    
    A type confusion issue has been found in the SVG implementation in the
    chromium browser before 72.0.3626.81.
    
    - CVE-2019-5758 (arbitrary code execution)
    
    A use after free issue has been found in the blink component of the
    chromium browser before 72.0.3626.81.
    
    - CVE-2019-5759 (arbitrary code execution)
    
    A use after free issue has been found in the HTML select elements
    component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5760 (arbitrary code execution)
    
    A use after free issue has been found in the WebRTC implementation in
    the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5761 (arbitrary code execution)
    
    A use after free issue has been found in the SwiftShader component of
    the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5762 (arbitrary code execution)
    
    A use after free issue has been found in the PDFium component of the
    chromium browser before 72.0.3626.81.
    
    - CVE-2019-5763 (arbitrary code execution)
    
    A security issue has been found in the V8 implementation of the
    chromium browser before 72.0.3626.81.
    
    - CVE-2019-5764 (arbitrary code execution)
    
    A use-after-free vulnerability has been found in the WebRTC component
    of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5765 (access restriction bypass)
    
    An insufficient policy enforcement issue has been found in the chromium
    browser before 72.0.3626.81.
    
    - CVE-2019-5766 (access restriction bypass)
    
    An insufficient policy enforcement issue has been found in the Canvas
    component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5767 (content spoofing)
    
    An incorrect security UI issue has been found in the WebAPKs component
    of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5768 (access restriction bypass)
    
    An insufficient policy enforcement issue has been found in the DevTools
    component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5769 (insufficient validation)
    
    An insufficient validation of untrusted input issue has been found in
    the Blink component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5770 (arbitrary code execution)
    
    A heap-based buffer overflow vulnerability has been found in the WebGL
    component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5771 (arbitrary code execution)
    
    A heap-based buffer overflow vulnerability has been found in the
    SwiftShader component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5772 (arbitrary code execution)
    
    A use-after-free vulnerability has been found in the PDFium component
    of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5773 (insufficient validation)
    
    An insufficient data validation issue has been found in the IndexedDB
    component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5774 (insufficient validation)
    
    An insufficient validation of untrusted input issue has been found in
    the SafeBrowsing component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5775 (content spoofing)
    
    An insufficient policy enforcement issue has been found in the OmniBox
    component of the chromium browser before 72.0.3626.81, allowing IDN URL
    spoofing.
    
    - CVE-2019-5776 (content spoofing)
    
    An insufficient policy enforcement issue has been found in the OmniBox
    component of the chromium browser before 72.0.3626.81, allowing IDN URL
    spoofing.
    
    - CVE-2019-5777 (content spoofing)
    
    An insufficient policy enforcement issue has been found in the OmniBox
    component of the chromium browser before 72.0.3626.81, allowing IDN URL
    spoofing.
    
    - CVE-2019-5778 (access restriction bypass)
    
    An insufficient policy enforcement issue has been found in the
    Extensions component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5779 (access restriction bypass)
    
    An insufficient policy enforcement issue has been found in the
    ServiceWorker component of the chromium browser before 72.0.3626.81.
    
    - CVE-2019-5780 (access restriction bypass)
    
    A security issue has been found in the chromium browser before
    72.0.3626.81 leading to Insufficient policy enforcement.
    
    - CVE-2019-5781 (content spoofing)
    
    A security issue has been found in the Omnibox implementation of the
    chromium browser before 72.0.3626.81.
    
    - CVE-2019-5782 (arbitrary code execution)
    
    A security issue has been found in the V8 implementation of the
    chromium browser before 72.0.3626.81.
    
    - CVE-2019-5783 (insufficient validation)
    
    An insufficient validation of untrusted input issue has been found in
    the DevTools component of the chromium browser before 72.0.3626.81.
    
    Impact
    ======
    
    A remote attacker can spoof the URL in the address bar, bypass security
    policies or execute arbitrary code.
    
    References
    ==========
    
    https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
    https://bugs.chromium.org/p/chromium/issues/detail?id=914497
    https://bugs.chromium.org/p/chromium/issues/detail?id=913296
    https://bugs.chromium.org/p/chromium/issues/detail?id=895152
    https://bugs.chromium.org/p/chromium/issues/detail?id=915469
    https://bugs.chromium.org/p/chromium/issues/detail?id=913970
    https://bugs.chromium.org/p/chromium/issues/detail?id=912211
    https://bugs.chromium.org/p/chromium/issues/detail?id=912074
    https://bugs.chromium.org/p/chromium/issues/detail?id=904714
    https://bugs.chromium.org/p/chromium/issues/detail?id=900552
    https://bugs.chromium.org/p/chromium/issues/detail?id=914731
    https://bugs.chromium.org/p/chromium/issues/detail?id=913246
    https://bugs.chromium.org/p/chromium/issues/detail?id=922627
    https://bugs.chromium.org/p/chromium/issues/detail?id=907047
    https://bugs.chromium.org/p/chromium/issues/detail?id=902427
    https://bugs.chromium.org/p/chromium/issues/detail?id=805557
    https://bugs.chromium.org/p/chromium/issues/detail?id=913975
    https://bugs.chromium.org/p/chromium/issues/detail?id=908749
    https://bugs.chromium.org/p/chromium/issues/detail?id=904265
    https://bugs.chromium.org/p/chromium/issues/detail?id=908292
    https://bugs.chromium.org/p/chromium/issues/detail?id=917668
    https://bugs.chromium.org/p/chromium/issues/detail?id=904182
    https://bugs.chromium.org/p/chromium/issues/detail?id=896722
    https://bugs.chromium.org/p/chromium/issues/detail?id=863663
    https://bugs.chromium.org/p/chromium/issues/detail?id=849421
    https://bugs.chromium.org/p/chromium/issues/detail?id=918470
    https://bugs.chromium.org/p/chromium/issues/detail?id=891697
    https://bugs.chromium.org/p/chromium/issues/detail?id=896725
    https://bugs.chromium.org/p/chromium/issues/detail?id=906043
    https://bugs.chromium.org/p/chromium/issues/detail?id=895081
    https://security.archlinux.org/CVE-2019-5754
    https://security.archlinux.org/CVE-2019-5755
    https://security.archlinux.org/CVE-2019-5756
    https://security.archlinux.org/CVE-2019-5757
    https://security.archlinux.org/CVE-2019-5758
    https://security.archlinux.org/CVE-2019-5759
    https://security.archlinux.org/CVE-2019-5760
    https://security.archlinux.org/CVE-2019-5761
    https://security.archlinux.org/CVE-2019-5762
    https://security.archlinux.org/CVE-2019-5763
    https://security.archlinux.org/CVE-2019-5764
    https://security.archlinux.org/CVE-2019-5765
    https://security.archlinux.org/CVE-2019-5766
    https://security.archlinux.org/CVE-2019-5767
    https://security.archlinux.org/CVE-2019-5768
    https://security.archlinux.org/CVE-2019-5769
    https://security.archlinux.org/CVE-2019-5770
    https://security.archlinux.org/CVE-2019-5771
    https://security.archlinux.org/CVE-2019-5772
    https://security.archlinux.org/CVE-2019-5773
    https://security.archlinux.org/CVE-2019-5774
    https://security.archlinux.org/CVE-2019-5775
    https://security.archlinux.org/CVE-2019-5776
    https://security.archlinux.org/CVE-2019-5777
    https://security.archlinux.org/CVE-2019-5778
    https://security.archlinux.org/CVE-2019-5779
    https://security.archlinux.org/CVE-2019-5780
    https://security.archlinux.org/CVE-2019-5781
    https://security.archlinux.org/CVE-2019-5782
    https://security.archlinux.org/CVE-2019-5783
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"6","type":"x","order":"1","pct":54.55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":27.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":18.18,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.