ASA-202005-2 log original external raw

[ASA-202005-2] chromium: arbitrary code execution
Arch Linux Security Advisory ASA-202005-2 ========================================= Severity: High Date : 2020-05-06 CVE-ID : CVE-2020-6464 CVE-2020-6831 Package : chromium Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-1149 Summary ======= The package chromium before version 81.0.4044.138-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 81.0.4044.138-1. # pacman -Syu "chromium>=81.0.4044.138-1" The problems have been fixed upstream in version 81.0.4044.138. Workaround ========== None. Description =========== - CVE-2020-6464 (arbitrary code execution) A type confusion issue has been found in the Blink component of the chromium browser before 81.0.4044.138. - CVE-2020-6831 (arbitrary code execution) A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC, in Firefox before 76.0, Thunderbird before 68.8.0 and chromium before 81.0.4044.138. This could have led to memory corruption and a potentially exploitable crash. Impact ====== A remote attacker can execute arbitrary code on the affected host. References ========== https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop.html https://crbug.com/1071059 https://bugzilla.mozilla.org/show_bug.cgi?id=1632241 https://crbug.com/1073602 https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/#CVE-2020-6831 https://www.mozilla.org/en-US/security/advisories/mfsa2020-18/#CVE-2020-6831 https://security.archlinux.org/CVE-2020-6464 https://security.archlinux.org/CVE-2020-6831