First published: Sun Jan 06 2019(Updated: )
Insufficient data validation in developer tools in Google Chrome on OS X prior to 74.0.3729.108 allowed a local attacker to execute arbitrary code via a crafted string copied to clipboard.
Credit: cve-coordination@google.com Svyat Mitin
Affected Software | Affected Version | How to fix |
---|---|---|
debian/chromium | 90.0.4430.212-1~deb10u1 116.0.5845.180-1~deb11u1 120.0.6099.129-1~deb11u1 119.0.6045.199-1~deb12u1 120.0.6099.129-1~deb12u1 120.0.6099.129-1 | |
Google Chrome (Trace Event) | <74.0.3729.108 | 74.0.3729.108 |
Google Chrome (Trace Event) | <74.0.3729.108 | |
Apple iOS and macOS | ||
SUSE Backports | =sle-15 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =42.3 | |
Fedora | =29 | |
Fedora | =30 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-5819 has a high severity rating due to its potential for arbitrary code execution by local attackers.
To address CVE-2019-5819, update Google Chrome to version 74.0.3729.108 or later.
CVE-2019-5819 affects all versions of Google Chrome prior to 74.0.3729.108.
CVE-2019-5819 requires local access for exploitation, meaning it cannot be leveraged remotely.
Yes, Google has released patches for CVE-2019-5819 in version 74.0.3729.108 and subsequent updates.