ArchLinux: 202011-2: chromium: multiple issues
Summary
- CVE-2020-16004 (arbitrary code execution)
A use after free security issue has been found in the user interface
component of the chromium browser before 86.0.4240.75.
- CVE-2020-16005 (arbitrary code execution)
An insufficient policy enforcement security issue has been found in the
ANGLE component of the chromium browser before 86.0.4240.75, allowing a
remote attacker to potentially exploit heap corruption via a crafted
HTML page.
- CVE-2020-16006 (arbitrary code execution)
An inappropriate implementation security issue has been found in the V8
component of the chromium browser before 86.0.4240.75, allowing a
remote attacker to potentially exploit heap corruption via a crafted
HTML page.
- CVE-2020-16007 (privilege escalation)
An insufficient data validation security issue has been found in the
installer component of the chromium browser before 86.0.4240.75,
allowing a local attacker to potentially elevate privilege via a
crafted filesystem.
- CVE-2020-16008 (arbitrary code execution)
A stack-based buffer overflow security issue has been found in the
WebRTC component of the chromium browser before 86.0.4240.75
- CVE-2020-16009 (arbitrary code execution)
An inappropriate implementation security issue has been found in the V8
component of the chromium browser before 86.0.4240.75. Google is aware
of reports that an exploit for this issue exists in the wild.
Resolution
Upgrade to 86.0.4240.183-1.
# pacman -Syu "chromium>=86.0.4240.183-1"
The problems have been fixed upstream in version 86.0.4240.183.
References
https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html https://security.archlinux.org/CVE-2020-16004 https://security.archlinux.org/CVE-2020-16005 https://security.archlinux.org/CVE-2020-16006 https://security.archlinux.org/CVE-2020-16007 https://security.archlinux.org/CVE-2020-16008 https://security.archlinux.org/CVE-2020-16009
Workaround
None.