Arch Linux alert ASA-201903-1 (chromium)
| From: | Santiago Torres-Arias <santiago@archlinux.org> | |
| To: | Archlinux security <arch-security@archlinux.org> | |
| Subject: | [ASA-201903-1] chromium: arbitrary code execution | |
| Date: | Sun, 3 Mar 2019 15:04:55 -0500 | |
| Message-ID: | <20190303200455.7szexlba62sh7mxg@LykOS.localdomain> |
Arch Linux Security Advisory ASA-201903-1 ========================================= Severity: High Date : 2019-03-02 CVE-ID : CVE-2019-5786 Package : chromium Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-916 Summary ======= The package chromium before version 72.0.3626.121-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 72.0.3626.121-1. # pacman -Syu "chromium>=72.0.3626.121-1" The problem has been fixed upstream in version 72.0.3626.121. Workaround ========== None. Description =========== A use-after-free issue has been found in the FileReader component of the chromium browser before 72.0.3626.121. Impact ====== A remote attacker can execute arbitrary code via a crafted file. References ========== https://chromereleases.googleblog.com/2019/03/stable-chan... https://bugs.chromium.org/p/chromium/issues/detail?id=936448 https://security.archlinux.org/CVE-2019-5786
