Subject: [ASA-202104-7] chromium: multiple issues Arch Linux Security Advisory ASA-202104-7 ========================================= Severity: High Date : 2021-04-29 CVE-ID : CVE-2021-21222 CVE-2021-21223 CVE-2021-21224 CVE-2021-21225 CVE-2021-21226 Package : chromium Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-1843 Summary ======= The package chromium before version 90.0.4430.85-1 is vulnerable to multiple issues including arbitrary code execution and sandbox escape. Resolution ========== Upgrade to 90.0.4430.85-1. # pacman -Syu "chromium>=90.0.4430.85-1" The problems have been fixed upstream in version 90.0.4430.85. Workaround ========== None. Description =========== - CVE-2021-21222 (sandbox escape) Heap buffer overflow in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. - CVE-2021-21223 (sandbox escape) Integer overflow in Mojo in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. - CVE-2021-21224 (arbitrary code execution) Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. Google is aware of reports that exploits for this issue exist in the wild. - CVE-2021-21225 (arbitrary code execution) Out of bounds memory access in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. - CVE-2021-21226 (sandbox escape) Use after free in navigation in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Impact ====== An attacker can escape the site isolation sandbox through a compromised rendered process. In addition, an attacker can execute arbitrary code and escape the sandbox through a crafted HTML page. References ========== https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html https://crbug.com/1194046 https://crbug.com/1195308 https://crbug.com/1195777 https://crbug.com/1195977 https://crbug.com/1197904 https://security.archlinux.org/CVE-2021-21222 https://security.archlinux.org/CVE-2021-21223 https://security.archlinux.org/CVE-2021-21224 https://security.archlinux.org/CVE-2021-21225 https://security.archlinux.org/CVE-2021-21226