[ASA-202103-9] chromium: arbitrary code execution
Morten Linderud
foxboron at archlinux.org
Sat Mar 20 12:15:03 UTC 2021
Arch Linux Security Advisory ASA-202103-9
=========================================
Severity: High
Date : 2021-03-13
CVE-ID : CVE-2021-21191 CVE-2021-21192 CVE-2021-21193
Package : chromium
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1683
Summary
=======
The package chromium before version 89.0.4389.90-1 is vulnerable to
arbitrary code execution.
Resolution
==========
Upgrade to 89.0.4389.90-1.
# pacman -Syu "chromium>=89.0.4389.90-1"
The problems have been fixed upstream in version 89.0.4389.90.
Workaround
==========
None.
Description
===========
- CVE-2021-21191 (arbitrary code execution)
A use after free security issue was found in the WebRTC component of
the Chromium browser before version 89.0.4389.90.
- CVE-2021-21192 (arbitrary code execution)
A heap buffer overflow security issue was found in the tab groups
component of the Chromium browser before version 89.0.4389.90.
- CVE-2021-21193 (arbitrary code execution)
A use after free security issue was found in the Blink component of the
Chromium browser before version 89.0.4389.90. Google is aware of
reports that an exploit for this issue exists in the wild.
Impact
======
A remote attacker can execute arbitrary code on the affected host.
Google is aware of reports that an exploit for CVE-2021-21193 exists in
the wild.
References
==========
https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html
https://crbug.com/1167357
https://crbug.com/1181387
https://crbug.com/1186287
https://security.archlinux.org/CVE-2021-21191
https://security.archlinux.org/CVE-2021-21192
https://security.archlinux.org/CVE-2021-21193
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210320/18af20b1/attachment.sig>
More information about the arch-security
mailing list