First published: Tue Apr 30 2019(Updated: )
Chrome could allow a remote malicious user to execute arbitrary code on the system, caused by an out-of-bounds access in SQLite. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service. External References: <a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/160450">https://exchange.xforce.ibmcloud.com/vulnerabilities/160450</a>
Credit: chrome-cve-admin@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <74.0.3729.131 | 74.0.3729.131 |
redhat/chromium-browser | <74.0.3729.131 | 74.0.3729.131 |
Google Chrome | <74.0.3729.131 | |
SUSE Backports | =sle-15 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
openSUSE | =42.3 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
Ubuntu Linux | =19.10 | |
debian/chromium | 120.0.6099.224-1~deb11u1 131.0.6778.139-1~deb12u1 132.0.6834.110-1~deb12u1 132.0.6834.110-1 | |
debian/sqlite3 | 3.34.1-3 3.34.1-3+deb11u1 3.40.1-2+deb12u1 3.46.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this security issue is CVE-2019-5827.
The affected software is Google Chrome prior to version 74.0.3729.131.
No, this vulnerability does not allow remote code execution.
To fix this vulnerability, update Google Chrome to version 74.0.3729.131 or later.
The severity of CVE-2019-5827 is high, with a CVSS score of 8.8.