|
|
Subscribe / Log in / New account

Arch Linux alert ASA-202006-12 (chromium)

From:  Morten Linderud <foxboron@archlinux.org>
To:  arch-security@archlinux.org
Subject:  [ASA-202006-12] chromium: arbitrary code execution
Date:  Tue, 30 Jun 2020 22:32:33 +0200
Message-ID:  <20200630203233.6zdf7tsy3nucdvsr@anathema>

Arch Linux Security Advisory ASA-202006-12 ========================================== Severity: High Date : 2020-06-28 CVE-ID : CVE-2020-6509 Package : chromium Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-1192 Summary ======= The package chromium before version 83.0.4103.116-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 83.0.4103.116-1. # pacman -Syu "chromium>=83.0.4103.116-1" The problem has been fixed upstream in version 83.0.4103.116. Workaround ========== None. Description =========== A use-after-free vulnerability has been found in the extensions component of chromium before 83.0.4103.116. Impact ====== A remote attacker can execute arbitrary code on the affected host. References ========== https://chromereleases.googleblog.com/2020/06/stable-chan... https://crbug.com/1092308 https://security.archlinux.org/CVE-2020-6509


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds