[ASA-202012-14] chromium: multiple issues
Morten Linderud
foxboron at archlinux.org
Thu Dec 17 19:21:59 UTC 2020
Arch Linux Security Advisory ASA-202012-14
==========================================
Severity: High
Date : 2020-12-09
CVE-ID : CVE-2020-16037 CVE-2020-16038 CVE-2020-16039 CVE-2020-16040
CVE-2020-16041 CVE-2020-16042
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1323
Summary
=======
The package chromium before version 87.0.4280.88-1 is vulnerable to
multiple issues including arbitrary code execution, information
disclosure, insufficient validation and denial of service.
Resolution
==========
Upgrade to 87.0.4280.88-1.
# pacman -Syu "chromium>=87.0.4280.88-1"
The problems have been fixed upstream in version 87.0.4280.88.
Workaround
==========
None.
Description
===========
- CVE-2020-16037 (arbitrary code execution)
A use after free security issue has been found in the clipboard
component of the chromium browser before version 87.0.4280.88.
- CVE-2020-16038 (arbitrary code execution)
A use after free security issue has been found in the media component
of the chromium browser before version 87.0.4280.88.
- CVE-2020-16039 (arbitrary code execution)
A use after free security issue has been found in the extensions
component of the chromium browser before version 87.0.4280.88.
- CVE-2020-16040 (insufficient validation)
An insufficient data validation security issue has been found in the V8
component of the chromium browser before version 87.0.4280.88.
- CVE-2020-16041 (denial of service)
An out of bounds read security issue has been found in the networking
component of the chromium browser before version 87.0.4280.88.
- CVE-2020-16042 (information disclosure)
An uninitialized use security issue has been found in the V8 component
of the chromium browser before version 87.0.4280.88 and Firefox before
84.0.
Impact
======
A remote attacker might be able to crash the application, read memory
or execute arbitrary code.
References
==========
https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html
https://crbug.com/1142331
https://crbug.com/1138683
https://crbug.com/1149177
https://crbug.com/1150649
https://crbug.com/1151865
https://crbug.com/1151890
https://www.mozilla.org/en-US/security/advisories/mfsa2020-54/#CVE-2020-16042
https://bugzilla.mozilla.org/show_bug.cgi?id=1679003
https://security.archlinux.org/CVE-2020-16037
https://security.archlinux.org/CVE-2020-16038
https://security.archlinux.org/CVE-2020-16039
https://security.archlinux.org/CVE-2020-16040
https://security.archlinux.org/CVE-2020-16041
https://security.archlinux.org/CVE-2020-16042
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20201217/e7b9bc50/attachment.sig>
More information about the arch-security
mailing list