ArchLinux: 202104-7: chromium: multiple issues | LinuxSecurity.com
Arch Linux Security Advisory ASA-202104-7
=========================================

Severity: High
Date    : 2021-04-29
CVE-ID  : CVE-2021-21222 CVE-2021-21223 CVE-2021-21224 CVE-2021-21225
          CVE-2021-21226
Package : chromium
Type    : multiple issues
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1843

Summary
=======

The package chromium before version 90.0.4430.85-1 is vulnerable to
multiple issues including arbitrary code execution and sandbox escape.

Resolution
==========

Upgrade to 90.0.4430.85-1.

# pacman -Syu "chromium>=90.0.4430.85-1"

The problems have been fixed upstream in version 90.0.4430.85.

Workaround
==========

None.

Description
===========

- CVE-2021-21222 (sandbox escape)

Heap buffer overflow in V8 in Google Chrome prior to 90.0.4430.85
allowed a remote attacker who had compromised the renderer process to
bypass site isolation via a crafted HTML page.

- CVE-2021-21223 (sandbox escape)

Integer overflow in Mojo in Google Chrome prior to 90.0.4430.85 allowed
a remote attacker who had compromised the renderer process to
potentially perform a sandbox escape via a crafted HTML page.

- CVE-2021-21224 (arbitrary code execution)

Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a
remote attacker to execute arbitrary code inside a sandbox via a
crafted HTML page. Google is aware of reports that exploits for this
issue exist in the wild.

- CVE-2021-21225 (arbitrary code execution)

Out of bounds memory access in V8 in Google Chrome prior to
90.0.4430.85 allowed a remote attacker to potentially exploit heap
corruption via a crafted HTML page.

- CVE-2021-21226 (sandbox escape)

Use after free in navigation in Google Chrome prior to 90.0.4430.85
allowed a remote attacker who had compromised the renderer process to
potentially perform a sandbox escape via a crafted HTML page.

Impact
======

An attacker can escape the site isolation sandbox through a compromised
rendered process. In addition, an attacker can execute arbitrary code
and escape the sandbox through a crafted HTML page.

References
==========

https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html
https://crbug.com/1194046
https://crbug.com/1195308
https://crbug.com/1195777
https://crbug.com/1195977
https://crbug.com/1197904
https://security.archlinux.org/CVE-2021-21222
https://security.archlinux.org/CVE-2021-21223
https://security.archlinux.org/CVE-2021-21224
https://security.archlinux.org/CVE-2021-21225
https://security.archlinux.org/CVE-2021-21226

ArchLinux: 202104-7: chromium: multiple issues

April 29, 2021
The package chromium before version 90.0.4430.85-1 is vulnerable to multiple issues including arbitrary code execution and sandbox escape

Summary

- CVE-2021-21222 (sandbox escape)
Heap buffer overflow in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
- CVE-2021-21223 (sandbox escape)
Integer overflow in Mojo in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- CVE-2021-21224 (arbitrary code execution)
Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. Google is aware of reports that exploits for this issue exist in the wild.
- CVE-2021-21225 (arbitrary code execution)
Out of bounds memory access in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- CVE-2021-21226 (sandbox escape)
Use after free in navigation in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

Resolution

Upgrade to 90.0.4430.85-1.
# pacman -Syu "chromium>=90.0.4430.85-1"
The problems have been fixed upstream in version 90.0.4430.85.

References

https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html https://crbug.com/1194046 https://crbug.com/1195308 https://crbug.com/1195777 https://crbug.com/1195977 https://crbug.com/1197904 https://security.archlinux.org/CVE-2021-21222 https://security.archlinux.org/CVE-2021-21223 https://security.archlinux.org/CVE-2021-21224 https://security.archlinux.org/CVE-2021-21225 https://security.archlinux.org/CVE-2021-21226

Severity
CVE-ID : CVE-2021-21222 CVE-2021-21223 CVE-2021-21224 CVE-2021-21225
CVE-2021-21226
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1843

Impact

An attacker can escape the site isolation sandbox through a compromised rendered process. In addition, an attacker can execute arbitrary code and escape the sandbox through a crafted HTML page.

Workaround

None.

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.