First published: Tue Dec 11 2018(Updated: )
Use-after-garbage-collection in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Credit: Zhe Jin(金哲),Luyao Liu(刘路遥) Chengdu Security Response Center of Qihoo 360 Technology Co cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | |
SUSE Backports | =sle-15 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-5787 is classified as a high-severity vulnerability due to the potential for remote code execution.
To fix CVE-2019-5787, update Google Chrome or Chromium-browser to version 73.0.3683.75 or higher.
The impact of CVE-2019-5787 includes possible heap corruption, which could allow attackers to execute arbitrary code on the user's system.
CVE-2019-5787 affects all versions of Google Chrome and Chromium-browser prior to 73.0.3683.75.
Currently, the only recommended mitigation for CVE-2019-5787 is to upgrade to the latest version of the browser.