[ASA-202111-9] chromium: multiple issues

Jonas Witschel diabonas at archlinux.org
Fri Nov 19 09:46:08 UTC 2021


Arch Linux Security Advisory ASA-202111-9
=========================================

Severity: High
Date    : 2021-11-18
CVE-ID  : CVE-2021-38005 CVE-2021-38006 CVE-2021-38007 CVE-2021-38008
          CVE-2021-38009 CVE-2021-38010 CVE-2021-38011 CVE-2021-38012
          CVE-2021-38013 CVE-2021-38014 CVE-2021-38015 CVE-2021-38016
          CVE-2021-38017 CVE-2021-38018 CVE-2021-38019 CVE-2021-38020
          CVE-2021-38021 CVE-2021-38022
Package : chromium
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-2560

Summary
=======

The package chromium before version 96.0.4664.45-1 is vulnerable to
multiple issues including arbitrary code execution, access restriction
bypass, content spoofing, information disclosure, same-origin policy
bypass, sandbox escape and denial of service.

Resolution
==========

Upgrade to 96.0.4664.45-1.

# pacman -Syu "chromium>=96.0.4664.45-1"

The problems have been fixed upstream in version 96.0.4664.45.

Workaround
==========

None.

Description
===========

- CVE-2021-38005 (arbitrary code execution)

A use after free security issue has been found in the loader component
of the Chromium browser engine before version 96.0.4664.45.

- CVE-2021-38006 (arbitrary code execution)

A use after free security issue has been found in the storage
foundation component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38007 (arbitrary code execution)

A type confusion security issue has been found in the V8 component of
the Chromium browser engine before version 96.0.4664.45.

- CVE-2021-38008 (arbitrary code execution)

A use after free security issue has been found in the media component
of the Chromium browser engine before version 96.0.4664.45.

- CVE-2021-38009 (arbitrary code execution)

An inappropriate implementation security issue has been found in the
cache component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38010 (arbitrary code execution)

An inappropriate implementation security issue has been found in the
service workers component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38011 (arbitrary code execution)

A use after free security issue has been found in the storage
foundation component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38012 (arbitrary code execution)

A type confusion security issue has been found in the V8 component of
the Chromium browser engine before version 96.0.4664.45.

- CVE-2021-38013 (arbitrary code execution)

A heap buffer overflow security issue has been found in the fingerprint
recognition component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38014 (arbitrary code execution)

An out of bounds write security issue has been found in the Swiftshader
component of the Chromium browser engine before version 96.0.4664.45.

- CVE-2021-38015 (arbitrary code execution)

An inappropriate implementation security issue has been found in the
input component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38016 (access restriction bypass)

An insufficient policy enforcement security issue has been found in the
background fetch component of the Chromium browser engine before
version 96.0.4664.45.

- CVE-2021-38017 (sandbox escape)

An insufficient policy enforcement security issue has been found in the
iframe sandbox component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38018 (content spoofing)

An inappropriate implementation security issue has been found in the
navigation component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38019 (same-origin policy bypass)

An insufficient policy enforcement security issue has been found in the
CORS component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38020 (information disclosure)

An insufficient policy enforcement security issue has been found in the
contacts picker component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38021 (information disclosure)

An inappropriate implementation security issue has been found in the
referrer component of the Chromium browser engine before version
96.0.4664.45.

- CVE-2021-38022 (denial of service)

An inappropriate implementation security issue has been found in the
WebAuthentication component of the Chromium browser engine before
version 96.0.4664.45.

Impact
======

A remote attacker could execute arbitrary code, spoof content, bypass
security restrictions or crash the browser through crafted web content.

References
==========

https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html
https://crbug.com/1241091
https://crbug.com/1240593
https://crbug.com/1254189
https://crbug.com/1263620
https://crbug.com/1260649
https://crbug.com/1264477
https://crbug.com/1268274
https://crbug.com/1262791
https://crbug.com/1242392
https://crbug.com/1248567
https://crbug.com/957553
https://crbug.com/1244289
https://crbug.com/1256822
https://crbug.com/1197889
https://crbug.com/1251179
https://crbug.com/1259694
https://crbug.com/1233375
https://crbug.com/1248862
https://security.archlinux.org/CVE-2021-38005
https://security.archlinux.org/CVE-2021-38006
https://security.archlinux.org/CVE-2021-38007
https://security.archlinux.org/CVE-2021-38008
https://security.archlinux.org/CVE-2021-38009
https://security.archlinux.org/CVE-2021-38010
https://security.archlinux.org/CVE-2021-38011
https://security.archlinux.org/CVE-2021-38012
https://security.archlinux.org/CVE-2021-38013
https://security.archlinux.org/CVE-2021-38014
https://security.archlinux.org/CVE-2021-38015
https://security.archlinux.org/CVE-2021-38016
https://security.archlinux.org/CVE-2021-38017
https://security.archlinux.org/CVE-2021-38018
https://security.archlinux.org/CVE-2021-38019
https://security.archlinux.org/CVE-2021-38020
https://security.archlinux.org/CVE-2021-38021
https://security.archlinux.org/CVE-2021-38022
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20211119/206919d7/attachment.sig>


More information about the arch-security mailing list