First published: Thu Dec 13 2018(Updated: )
An integer overflow leading to an incorrect capacity of a buffer in JavaScript in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Credit: Dimitri Fourny (Blue Frost Security) cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chromium-browser | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | 73.0.3683.75 |
Google Chrome | <73.0.3683.75 | |
SUSE Backports | =sle-15 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
openSUSE | =42.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-5790 has been classified as a critical vulnerability.
To fix CVE-2019-5790, update to Google Chrome version 73.0.3683.75 or later.
CVE-2019-5790 affects Google Chrome, Chromium browser, and certain versions of openSUSE.
Yes, CVE-2019-5790 allows a remote attacker to execute arbitrary code inside a sandbox.
The V8 component of Google Chrome is primarily affected by CVE-2019-5790.