First published: Thu Jun 27 2019(Updated: )
Insufficient policy enforcement in extensions API in Google Chrome prior to 75.0.3770.80 allowed an attacker who convinced a user to install a malicious extension to bypass restrictions on file URIs via a crafted Chrome Extension.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <75.0.3770.80 | |
Opensuse Backports | =sle-15 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =42.3 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Debian Debian Linux | =10.0 | |
debian/chromium | 90.0.4430.212-1~deb10u1 116.0.5845.180-1~deb11u1 120.0.6099.129-1~deb11u1 119.0.6045.199-1~deb12u1 120.0.6099.129-1~deb12u1 120.0.6099.129-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5838 is a vulnerability in Google Chrome that allows an attacker to bypass restrictions on file URIs via a malicious extension.
Google Chrome versions prior to 75.0.3770.80, openSUSE Backports, openSUSE Leap versions 15.0, 15.1, and 42.3, Fedora versions 29 and 30, and Debian Linux version 10.0 are affected by CVE-2019-5838.
CVE-2019-5838 has a severity rating of 4.3, which is considered medium.
Update Google Chrome to version 75.0.3770.80 or later to fix CVE-2019-5838.
You can find more information about CVE-2019-5838 at the following references: [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2019-5838), [openSUSE Security Announcement](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html), [Google Chrome Blog](https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop.html).