[ASA-202009-9] chromium: multiple issues
Morten Linderud
foxboron at archlinux.org
Tue Sep 29 16:39:56 UTC 2020
Arch Linux Security Advisory ASA-202009-9
=========================================
Severity: High
Date : 2020-09-23
CVE-ID : CVE-2020-15960 CVE-2020-15961 CVE-2020-15962 CVE-2020-15963
CVE-2020-15964 CVE-2020-15965 CVE-2020-15966
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1234
Summary
=======
The package chromium before version 85.0.4183.121-1 is vulnerable to
multiple issues including access restriction bypass, arbitrary code
execution, information disclosure and insufficient validation.
Resolution
==========
Upgrade to 85.0.4183.121-1.
# pacman -Syu "chromium>=85.0.4183.121-1"
The problems have been fixed upstream in version 85.0.4183.121.
Workaround
==========
None.
Description
===========
- CVE-2020-15960 (information disclosure)
An out of bounds read security issue has been found in the storage
component of the chromium browser before 85.0.4183.121.
- CVE-2020-15961 (access restriction bypass)
An insufficient policy enforcement security issue has been found in the
extensions component of the chromium browser before 85.0.4183.121
- CVE-2020-15962 (access restriction bypass)
An insufficient policy enforcement security issue has been found in the
serial component of the chromium browser before 85.0.4183.121.
- CVE-2020-15963 (access restriction bypass)
An insufficient policy enforcement security issue has been found in the
extensions component of the chromium browser before 85.0.4183.121.
- CVE-2020-15964 (arbitrary code execution)
An out of bounds write security issue has been found in the V8
component of the chromium browser before 85.0.4183.121.
- CVE-2020-15965 (access restriction bypass)
An insufficient policy enforcement security issue has been found in the
extensions component of the chromium browser before 85.0.4183.121.
- CVE-2020-15966 (insufficient validation)
An insufficient data validation security issue has been found in the
media component of the chromium browser before 85.0.4183.121.
Impact
======
A remote attacker might be able to bypass security restrictions, access
sensitive information or execute arbitrary code on the affected host.
References
==========
https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
https://crbug.com/1100136
https://crbug.com/1114636
https://crbug.com/1121836
https://crbug.com/1113558
https://crbug.com/1126249
https://crbug.com/1113565
https://crbug.com/1121414
https://security.archlinux.org/CVE-2020-15960
https://security.archlinux.org/CVE-2020-15961
https://security.archlinux.org/CVE-2020-15962
https://security.archlinux.org/CVE-2020-15963
https://security.archlinux.org/CVE-2020-15964
https://security.archlinux.org/CVE-2020-15965
https://security.archlinux.org/CVE-2020-15966
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20200929/f7d8c440/attachment.sig>
More information about the arch-security
mailing list