ASA-202006-3 log generated external raw
[ASA-202006-3] chromium: multiple issues |
---|
Arch Linux Security Advisory ASA-202006-3
=========================================
Severity: High
Date : 2020-06-06
CVE-ID : CVE-2020-6493 CVE-2020-6494 CVE-2020-6495 CVE-2020-6496
Package : chromium
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-1178
Summary
=======
The package chromium before version 83.0.4103.97-1 is vulnerable to
multiple issues including access restriction bypass, arbitrary code
execution and content spoofing.
Resolution
==========
Upgrade to 83.0.4103.97-1.
# pacman -Syu "chromium>=83.0.4103.97-1"
The problems have been fixed upstream in version 83.0.4103.97.
Workaround
==========
None.
Description
===========
- CVE-2020-6493 (arbitrary code execution)
A use-after-free security issue has been found in the WebAuthentication
component of the chromium browser before 83.0.4103.97.
- CVE-2020-6494 (content spoofing)
An incorrect security UI security issue has been found in the payments
component of the chromium browser before 83.0.4103.97
- CVE-2020-6495 (access restriction bypass)
An insufficient policy enforcement security issue has been found in the
developer tools component of the chromium browser before 83.0.4103.97.
- CVE-2020-6496 (arbitrary code execution)
A use-after-free security issue has been found in the payments
component of the chromium browser before 83.0.4103.97.
Impact
======
A remote attacker might be able to spoof content, bypass security
restrictions or validations checks, or execute arbitrary code on the
affected host.
References
==========
https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html
https://crbug.com/1082105
https://crbug.com/1083972
https://crbug.com/1072116
https://crbug.com/1085990
https://security.archlinux.org/CVE-2020-6493
https://security.archlinux.org/CVE-2020-6494
https://security.archlinux.org/CVE-2020-6495
https://security.archlinux.org/CVE-2020-6496
|