[ASA-201904-12] chromium: multiple issues

Remi Gacogne rgacogne at archlinux.org
Fri Apr 26 20:08:29 UTC 2019


Arch Linux Security Advisory ASA-201904-12
==========================================

Severity: Critical
Date    : 2019-04-24
CVE-ID  : CVE-2019-5805 CVE-2019-5806 CVE-2019-5807 CVE-2019-5808
          CVE-2019-5809 CVE-2019-5810 CVE-2019-5811 CVE-2019-5813
          CVE-2019-5814 CVE-2019-5815 CVE-2019-5818 CVE-2019-5819
          CVE-2019-5820 CVE-2019-5821 CVE-2019-5822 CVE-2019-5823
Package : chromium
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-952

Summary
=======

The package chromium before version 74.0.3729.108-1 is vulnerable to
multiple issues including arbitrary code execution, access restriction
bypass, information disclosure and insufficient validation.

Resolution
==========

Upgrade to 74.0.3729.108-1.

# pacman -Syu "chromium>=74.0.3729.108-1"

The problems have been fixed upstream in version 74.0.3729.108.

Workaround
==========

None.

Description
===========

- CVE-2019-5805 (arbitrary code execution)

A use-after-free vulnerability has been found in the PDFium component
of the chromium browser before 74.0.3729.108.

- CVE-2019-5806 (arbitrary code execution)

An integer overflow vulnerability has been found in the Andle component
of the chromium browser before 74.0.3729.108.

- CVE-2019-5807 (arbitrary code execution)

A memory corruption vulnerability has been found in the V8 component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5808 (arbitrary code execution)

A use-after-free vulnerability has been found in the Blink component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5809 (arbitrary code execution)

A use-after-free vulnerability has been found in the Blink component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5810 (information disclosure)

A user information disclosure vulnerability has been found in the
Autofill component of the chromium browser before 74.0.3729.108.

- CVE-2019-5811 (access restriction bypass)

A CORS bypass vulnerability has been found in the Blink component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5813 (information disclosure)

An out-of-bounds read vulnerability has been found in the V8 component
of the chromium browser before 74.0.3729.108.

- CVE-2019-5814 (access restriction bypass)

A CORS bypass vulnerability has been found in the Blink component of
the chromium browser before 74.0.3729.108.

- CVE-2019-5815 (arbitrary code execution)

A heap-based buffer overflow vulnerability has been found in the Blink
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5818 (information disclosure)

An uninitialized value vulnerability has been found in the media reader
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5819 (insufficient validation)

An incorrect escaping vulnerability has been found in the developer
tools component of the chromium browser before 74.0.3729.108.

- CVE-2019-5820 (arbitrary code execution)

An integer overflow vulnerability has been found in the PDFium
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5821 (arbitrary code execution)

An integer overflow vulnerability has been found in the PDFium
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5822 (access restriction bypass)

A CORS bypass vulnerability has been found in the download manager
component of the chromium browser before 74.0.3729.108.

- CVE-2019-5823 (access restriction bypass)

A forced navigation from service worker vulnerability has been found in
the chromium browser before 74.0.3729.108.

Impact
======

A remote attacker can access sensitive information, bypass security
measures and execute arbitrary code on the affected host.

References
==========

https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_23.html
https://crbug.com/913320
https://crbug.com/943087
https://crbug.com/945644
https://crbug.com/947029
https://crbug.com/941008
https://crbug.com/916838
https://crbug.com/771815
https://crbug.com/942699
https://crbug.com/930057
https://crbug.com/930663
https://crbug.com/929962
https://crbug.com/919356
https://crbug.com/919635
https://crbug.com/919640
https://crbug.com/926105
https://security.archlinux.org/CVE-2019-5805
https://security.archlinux.org/CVE-2019-5806
https://security.archlinux.org/CVE-2019-5807
https://security.archlinux.org/CVE-2019-5808
https://security.archlinux.org/CVE-2019-5809
https://security.archlinux.org/CVE-2019-5810
https://security.archlinux.org/CVE-2019-5811
https://security.archlinux.org/CVE-2019-5813
https://security.archlinux.org/CVE-2019-5814
https://security.archlinux.org/CVE-2019-5815
https://security.archlinux.org/CVE-2019-5818
https://security.archlinux.org/CVE-2019-5819
https://security.archlinux.org/CVE-2019-5820
https://security.archlinux.org/CVE-2019-5821
https://security.archlinux.org/CVE-2019-5822
https://security.archlinux.org/CVE-2019-5823

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190426/16ad50ad/attachment-0001.sig>


More information about the arch-security mailing list