chromium is vulnerable to authorization bypass. A missing case for handling special schemes in permission request checks in Extensions allows an attacker to install a malicious extension on a victim’s host to bypass extension permission checks for privileged pages via a malicious Chrome Extension.
www.securityfocus.com/bid/106767
access.redhat.com/errata/RHSA-2019:0309
chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
crbug.com/918470
lists.fedoraproject.org/archives/list/[email protected]/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
lists.fedoraproject.org/archives/list/[email protected]/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
security-tracker.debian.org/tracker/CVE-2019-5778
www.debian.org/security/2019/dsa-4395