[ASA-201908-1] chromium: multiple issues

Remi Gacogne rgacogne at archlinux.org
Mon Aug 5 21:01:38 UTC 2019


Arch Linux Security Advisory ASA-201908-1
=========================================

Severity: High
Date    : 2019-08-02
CVE-ID  : CVE-2019-5850 CVE-2019-5851 CVE-2019-5852 CVE-2019-5853
          CVE-2019-5854 CVE-2019-5855 CVE-2019-5856 CVE-2019-5857
          CVE-2019-5858 CVE-2019-5859 CVE-2019-5860 CVE-2019-5861
          CVE-2019-5862 CVE-2019-5864 CVE-2019-5865
Package : chromium
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1013

Summary
=======

The package chromium before version 76.0.3809.87-1 is vulnerable to
multiple issues including access restriction bypass, arbitrary code
execution, content spoofing, denial of service and insufficient
validation.

Resolution
==========

Upgrade to 76.0.3809.87-1.

# pacman -Syu "chromium>=76.0.3809.87-1"

The problems have been fixed upstream in version 76.0.3809.87.

Workaround
==========

None.

Description
===========

- CVE-2019-5850 (arbitrary code execution)

A use-after-free issue has been found in the offline page fetcher
component of Chromium before 76.0.3809.87.

- CVE-2019-5851 (arbitrary code execution)

A use-after-poison issue has been found in the offline audio context
component of Chromium before 76.0.3809.87.

- CVE-2019-5852 (denial of service)

An object leak issue has been found in the utility functions of
Chromium before 76.0.3809.87.

- CVE-2019-5853 (arbitrary code execution)

A memory corruption issue has been found in the regexp length checks of
Chromium before 76.0.3809.87.

- CVE-2019-5854 (arbitrary code execution)

An integer overflow issue has been found in the text rendering of the
PDFium component of Chromium before 76.0.3809.87.

- CVE-2019-5855 (arbitrary code execution)

An integer overflow issue has been found in the text rendering of the
PDFium component of Chromium before 76.0.3809.87.

- CVE-2019-5856 (access restriction bypass)

An insufficient checks on filesystem: URI permissions issue has been
found in Chromium before 76.0.3809.87.

- CVE-2019-5857 (denial of service)

An issue has been found in Chromium before 76.0.3809.87 where the
comparison of -0 and null yields a crash.

- CVE-2019-5858 (insufficient validation)

An insufficient filtering of Open URL service parameters issue has been
found in Chromium before 76.0.3809.87.

- CVE-2019-5859 (access restriction bypass)

An issue has been found in Chromium before 76.0.3809.87, where res:
URIs can load alternative browsers.

- CVE-2019-5860 (arbitrary code execution)

A use-after-free issue has been found in the PDFium component of
Chromium before 76.0.3809.87.

- CVE-2019-5861 (content spoofing)

An issue has been found in Chromium before 76.0.3809.87, where click
location was incorrectly checked.

- CVE-2019-5862 (access restriction bypass)

An issue with AppCache not being robust to compromised renderers has
been found in Chromium before 76.0.3809.87.

- CVE-2019-5864 (access restriction bypass)

An insufficient port filtering in CORS for extensions issue has been
found in Chromium before 76.0.3809.87.

- CVE-2019-5865 (access restriction bypass)

A site isolation bypass from a compromised renderer has been found in
Chromium before 76.0.3809.87.

Impact
======

A remote attacker can bypass security measures, cause a crash or
execute arbitrary code on the affected host.

References
==========

https://chromereleases.googleblog.com/2019/07/stable-channel-update-for-desktop_30.html
https://crbug.com/977462
https://crbug.com/977107
https://crbug.com/976713
https://crbug.com/976627
https://crbug.com/966263
https://crbug.com/964872
https://crbug.com/964245
https://crbug.com/961237
https://crbug.com/960209
https://crbug.com/959438
https://crbug.com/956947
https://crbug.com/951525
https://crbug.com/946260
https://crbug.com/936900
https://crbug.com/973103
https://security.archlinux.org/CVE-2019-5850
https://security.archlinux.org/CVE-2019-5851
https://security.archlinux.org/CVE-2019-5852
https://security.archlinux.org/CVE-2019-5853
https://security.archlinux.org/CVE-2019-5854
https://security.archlinux.org/CVE-2019-5855
https://security.archlinux.org/CVE-2019-5856
https://security.archlinux.org/CVE-2019-5857
https://security.archlinux.org/CVE-2019-5858
https://security.archlinux.org/CVE-2019-5859
https://security.archlinux.org/CVE-2019-5860
https://security.archlinux.org/CVE-2019-5861
https://security.archlinux.org/CVE-2019-5862
https://security.archlinux.org/CVE-2019-5864
https://security.archlinux.org/CVE-2019-5865

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190805/6263d41d/attachment.sig>


More information about the arch-security mailing list