Linux Security
    Linux Security
    Linux Security

    ArchLinux: 202005-2: chromium: arbitrary code execution

    Date
    270
    Posted By
    The package chromium before version 81.0.4044.138-1 is vulnerable to arbitrary code execution.
    Arch Linux Security Advisory ASA-202005-2
    =========================================
    
    Severity: High
    Date    : 2020-05-06
    CVE-ID  : CVE-2020-6464 CVE-2020-6831
    Package : chromium
    Type    : arbitrary code execution
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1149
    
    Summary
    =======
    
    The package chromium before version 81.0.4044.138-1 is vulnerable to
    arbitrary code execution.
    
    Resolution
    ==========
    
    Upgrade to 81.0.4044.138-1.
    
    # pacman -Syu "chromium>=81.0.4044.138-1"
    
    The problems have been fixed upstream in version 81.0.4044.138.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2020-6464 (arbitrary code execution)
    
    A type confusion issue has been found in the Blink component of the
    chromium browser before 81.0.4044.138.
    
    - CVE-2020-6831 (arbitrary code execution)
    
    A buffer overflow could occur when parsing and validating SCTP chunks
    in WebRTC, in Firefox before 76.0 and chromium before 81.0.4044.138.
    This could have led to memory corruption and a potentially exploitable
    crash.
    
    Impact
    ======
    
    A remote attacker can execute arbitrary code on the affected host.
    
    References
    ==========
    
    https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop.html
    https://crbug.com/1071059
    https://bugzilla.mozilla.org/show_bug.cgi?id=1632241
    https://crbug.com/1073602
    https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-6831
    https://security.archlinux.org/CVE-2020-6464
    https://security.archlinux.org/CVE-2020-6831
    
    

    Advisories

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.