Arch Linux Security Advisory ASA-202005-2
========================================
Severity: High
Date    : 2020-05-06
CVE-ID  : CVE-2020-6464 CVE-2020-6831
Package : chromium
Type    : arbitrary code execution
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1149

Summary
======
The package chromium before version 81.0.4044.138-1 is vulnerable to
arbitrary code execution.

Resolution
=========
Upgrade to 81.0.4044.138-1.

# pacman -Syu "chromium>=81.0.4044.138-1"

The problems have been fixed upstream in version 81.0.4044.138.

Workaround
=========
None.

Description
==========
- CVE-2020-6464 (arbitrary code execution)

A type confusion issue has been found in the Blink component of the
chromium browser before 81.0.4044.138.

- CVE-2020-6831 (arbitrary code execution)

A buffer overflow could occur when parsing and validating SCTP chunks
in WebRTC, in Firefox before 76.0 and chromium before 81.0.4044.138.
This could have led to memory corruption and a potentially exploitable
crash.

Impact
=====
A remote attacker can execute arbitrary code on the affected host.

References
=========
https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop.html
https://bugs.chromium.org/p/chromium/issues/detail
https://bugzilla.mozilla.org/show_bug.cgi?id=1632241
https://bugs.chromium.org/p/chromium/issues/detail
https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-6831
https://security.archlinux.org/CVE-2020-6464
https://security.archlinux.org/CVE-2020-6831

ArchLinux: 202005-2: chromium: arbitrary code execution

May 9, 2020

Summary

- CVE-2020-6464 (arbitrary code execution) A type confusion issue has been found in the Blink component of the chromium browser before 81.0.4044.138.
- CVE-2020-6831 (arbitrary code execution)
A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC, in Firefox before 76.0 and chromium before 81.0.4044.138. This could have led to memory corruption and a potentially exploitable crash.

Resolution

Upgrade to 81.0.4044.138-1. # pacman -Syu "chromium>=81.0.4044.138-1"
The problems have been fixed upstream in version 81.0.4044.138.

References

https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop.html https://bugs.chromium.org/p/chromium/issues/detail https://bugzilla.mozilla.org/show_bug.cgi?id=1632241 https://bugs.chromium.org/p/chromium/issues/detail https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-6831 https://security.archlinux.org/CVE-2020-6464 https://security.archlinux.org/CVE-2020-6831

Severity
Package : chromium
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1149

Workaround

None.

Related News