ArchLinux: 201904-12: chromium: multiple issues

    Date26 Apr 2019
    CategoryArchLinux
    273
    Posted ByLinuxSecurity Advisories
    The package chromium before version 74.0.3729.108-1 is vulnerable to multiple issues including arbitrary code execution, access restriction bypass, information disclosure and insufficient validation.
    Arch Linux Security Advisory ASA-201904-12
    ==========================================
    
    Severity: Critical
    Date    : 2019-04-24
    CVE-ID  : CVE-2019-5805 CVE-2019-5806 CVE-2019-5807 CVE-2019-5808
              CVE-2019-5809 CVE-2019-5810 CVE-2019-5811 CVE-2019-5813
              CVE-2019-5814 CVE-2019-5815 CVE-2019-5818 CVE-2019-5819
              CVE-2019-5820 CVE-2019-5821 CVE-2019-5822 CVE-2019-5823
    Package : chromium
    Type    : multiple issues
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-952
    
    Summary
    =======
    
    The package chromium before version 74.0.3729.108-1 is vulnerable to
    multiple issues including arbitrary code execution, access restriction
    bypass, information disclosure and insufficient validation.
    
    Resolution
    ==========
    
    Upgrade to 74.0.3729.108-1.
    
    # pacman -Syu "chromium>=74.0.3729.108-1"
    
    The problems have been fixed upstream in version 74.0.3729.108.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2019-5805 (arbitrary code execution)
    
    A use-after-free vulnerability has been found in the PDFium component
    of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5806 (arbitrary code execution)
    
    An integer overflow vulnerability has been found in the Andle component
    of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5807 (arbitrary code execution)
    
    A memory corruption vulnerability has been found in the V8 component of
    the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5808 (arbitrary code execution)
    
    A use-after-free vulnerability has been found in the Blink component of
    the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5809 (arbitrary code execution)
    
    A use-after-free vulnerability has been found in the Blink component of
    the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5810 (information disclosure)
    
    A user information disclosure vulnerability has been found in the
    Autofill component of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5811 (access restriction bypass)
    
    A CORS bypass vulnerability has been found in the Blink component of
    the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5813 (information disclosure)
    
    An out-of-bounds read vulnerability has been found in the V8 component
    of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5814 (access restriction bypass)
    
    A CORS bypass vulnerability has been found in the Blink component of
    the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5815 (arbitrary code execution)
    
    A heap-based buffer overflow vulnerability has been found in the Blink
    component of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5818 (information disclosure)
    
    An uninitialized value vulnerability has been found in the media reader
    component of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5819 (insufficient validation)
    
    An incorrect escaping vulnerability has been found in the developer
    tools component of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5820 (arbitrary code execution)
    
    An integer overflow vulnerability has been found in the PDFium
    component of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5821 (arbitrary code execution)
    
    An integer overflow vulnerability has been found in the PDFium
    component of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5822 (access restriction bypass)
    
    A CORS bypass vulnerability has been found in the download manager
    component of the chromium browser before 74.0.3729.108.
    
    - CVE-2019-5823 (access restriction bypass)
    
    A forced navigation from service worker vulnerability has been found in
    the chromium browser before 74.0.3729.108.
    
    Impact
    ======
    
    A remote attacker can access sensitive information, bypass security
    measures and execute arbitrary code on the affected host.
    
    References
    ==========
    
    https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html
    https://crbug.com/913320
    https://crbug.com/943087
    https://crbug.com/945644
    https://crbug.com/947029
    https://crbug.com/941008
    https://crbug.com/916838
    https://crbug.com/771815
    https://crbug.com/942699
    https://crbug.com/930057
    https://crbug.com/930663
    https://crbug.com/929962
    https://crbug.com/919356
    https://crbug.com/919635
    https://crbug.com/919640
    https://crbug.com/926105
    https://security.archlinux.org/CVE-2019-5805
    https://security.archlinux.org/CVE-2019-5806
    https://security.archlinux.org/CVE-2019-5807
    https://security.archlinux.org/CVE-2019-5808
    https://security.archlinux.org/CVE-2019-5809
    https://security.archlinux.org/CVE-2019-5810
    https://security.archlinux.org/CVE-2019-5811
    https://security.archlinux.org/CVE-2019-5813
    https://security.archlinux.org/CVE-2019-5814
    https://security.archlinux.org/CVE-2019-5815
    https://security.archlinux.org/CVE-2019-5818
    https://security.archlinux.org/CVE-2019-5819
    https://security.archlinux.org/CVE-2019-5820
    https://security.archlinux.org/CVE-2019-5821
    https://security.archlinux.org/CVE-2019-5822
    https://security.archlinux.org/CVE-2019-5823
    
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"67","title":"HOWTOs","votes":"2","type":"x","order":"3","pct":66.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.