|
|
Log in / Subscribe / Register

Arch Linux alert ASA-201903-1 (chromium)

From:  Santiago Torres-Arias <santiago@archlinux.org>
To:  Archlinux security <arch-security@archlinux.org>
Subject:  [ASA-201903-1] chromium: arbitrary code execution
Date:  Sun, 3 Mar 2019 15:04:55 -0500
Message-ID:  <20190303200455.7szexlba62sh7mxg@LykOS.localdomain>

Arch Linux Security Advisory ASA-201903-1 ========================================= Severity: High Date : 2019-03-02 CVE-ID : CVE-2019-5786 Package : chromium Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-916 Summary ======= The package chromium before version 72.0.3626.121-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 72.0.3626.121-1. # pacman -Syu "chromium>=72.0.3626.121-1" The problem has been fixed upstream in version 72.0.3626.121. Workaround ========== None. Description =========== A use-after-free issue has been found in the FileReader component of the chromium browser before 72.0.3626.121. Impact ====== A remote attacker can execute arbitrary code via a crafted file. References ========== https://chromereleases.googleblog.com/2019/03/stable-chan... https://bugs.chromium.org/p/chromium/issues/detail?id=936448 https://security.archlinux.org/CVE-2019-5786


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds