[ASA-201906-4] chromium: multiple issues
Remi Gacogne
rgacogne at archlinux.org
Sat Jun 8 19:49:15 UTC 2019
Arch Linux Security Advisory ASA-201906-4
=========================================
Severity: Critical
Date : 2019-06-07
CVE-ID : CVE-2019-5828 CVE-2019-5829 CVE-2019-5830 CVE-2019-5831
CVE-2019-5832 CVE-2019-5833 CVE-2019-5835 CVE-2019-5836
CVE-2019-5837 CVE-2019-5838 CVE-2019-5839 CVE-2019-5840
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-972
Summary
=======
The package chromium before version 75.0.3770.80-1 is vulnerable to
multiple issues including arbitrary code execution, access restriction
bypass, content spoofing, incorrect calculation and information
disclosure.
Resolution
==========
Upgrade to 75.0.3770.80-1.
# pacman -Syu "chromium>=75.0.3770.80-1"
The problems have been fixed upstream in version 75.0.3770.80.
Workaround
==========
None.
Description
===========
- CVE-2019-5828 (arbitrary code execution)
A use-after-free vulnerability has been found in the ServiceWorker
component of the chromium browser before 75.0.3770.80.
- CVE-2019-5829 (arbitrary code execution)
A use-after-free vulnerability has been found in the Download Manager
component of the chromium browser before 75.0.3770.80.
- CVE-2019-5830 (access restriction bypass)
An incorrectly credentialed requests vulnerability has been found in
the CORS component of the chromium browser before 75.0.3770.80.
- CVE-2019-5831 (incorrect calculation)
An incorrect map processing vulnerability has been found in the V8
component of the chromium browser before 75.0.3770.80.
- CVE-2019-5832 (access restriction bypass)
An incorrect CORS handling vulnerability has been found in the XHR
component of the chromium browser before 75.0.3770.80.
- CVE-2019-5833 (content spoofing)
An inconsistent security UI placement vulnerability has been found in
the chromium browser before 75.0.3770.80.
- CVE-2019-5835 (information disclosure)
An out-of-bounds read vulnerability has been found in the Swiftshader
component of the chromium browser before 75.0.3770.80.
- CVE-2019-5836 (arbitrary code execution)
A heap-based buffer overflow vulnerability has been found in the Angle
component of the chromium browser before 75.0.3770.80.
- CVE-2019-5837 (information disclosure)
A cross-origin resources size disclosure vulnerability has been found
in the Appcache component of the chromium browser before 75.0.3770.80.
- CVE-2019-5838 (access restriction bypass)
An overly permissive tab access vulnerability has been found in the
Extensions component of the chromium browser before 75.0.3770.80.
- CVE-2019-5839 (access restriction bypass)
An incorrect handling of certain code points vulnerability has been
found in the Blink component of the chromium browser before
75.0.3770.80.
- CVE-2019-5840 (access restriction bypass)
A popup blocker bypass vulnerability has been found in the chromium
browser before 75.0.3770.80.
Impact
======
A remote attacker can access sensitive information, bypass security
measures, spoof content and execute arbitrary code on the affected
host.
References
==========
https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html
https://crbug.com/956597
https://crbug.com/958533
https://crbug.com/665766
https://crbug.com/950328
https://crbug.com/959390
https://crbug.com/945067
https://crbug.com/939239
https://crbug.com/947342
https://crbug.com/918293
https://crbug.com/893087
https://crbug.com/925614
https://crbug.com/951782
https://security.archlinux.org/CVE-2019-5828
https://security.archlinux.org/CVE-2019-5829
https://security.archlinux.org/CVE-2019-5830
https://security.archlinux.org/CVE-2019-5831
https://security.archlinux.org/CVE-2019-5832
https://security.archlinux.org/CVE-2019-5833
https://security.archlinux.org/CVE-2019-5835
https://security.archlinux.org/CVE-2019-5836
https://security.archlinux.org/CVE-2019-5837
https://security.archlinux.org/CVE-2019-5838
https://security.archlinux.org/CVE-2019-5839
https://security.archlinux.org/CVE-2019-5840
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20190608/780cba5b/attachment.sig>
More information about the arch-security
mailing list