ArchLinux: 201903-1: chromium: arbitrary code execution

    Date03 Mar 2019
    CategoryArchLinux
    458
    Posted ByLinuxSecurity Advisories
    The package chromium before version 72.0.3626.121-1 is vulnerable to arbitrary code execution.
    Arch Linux Security Advisory ASA-201903-1
    =========================================
    
    Severity: High
    Date    : 2019-03-02
    CVE-ID  : CVE-2019-5786
    Package : chromium
    Type    : arbitrary code execution
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-916
    
    Summary
    =======
    
    The package chromium before version 72.0.3626.121-1 is vulnerable to
    arbitrary code execution.
    
    Resolution
    ==========
    
    Upgrade to 72.0.3626.121-1.
    
    # pacman -Syu "chromium>=72.0.3626.121-1"
    
    The problem has been fixed upstream in version 72.0.3626.121.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    A use-after-free issue has been found in the FileReader component of
    the chromium browser before 72.0.3626.121.
    
    Impact
    ======
    
    A remote attacker can execute arbitrary code via a crafted file.
    
    References
    ==========
    
    https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html
    https://bugs.chromium.org/p/chromium/issues/detail?id=936448
    https://security.archlinux.org/CVE-2019-5786
    

    Comments powered by CComment

    LinuxSecurity Poll

    Which Linux distribution(s) do you use?

    Message!

    Poll results are hidden from public viewing.

    You are not authorized to vote on this poll.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 5 answer(s).
    /component/communitypolls/?task=poll.vote
    7
    radio
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.