Arch Linux alert ASA-202006-12 (chromium)
From: | Morten Linderud <foxboron@archlinux.org> | |
To: | arch-security@archlinux.org | |
Subject: | [ASA-202006-12] chromium: arbitrary code execution | |
Date: | Tue, 30 Jun 2020 22:32:33 +0200 | |
Message-ID: | <20200630203233.6zdf7tsy3nucdvsr@anathema> |
Arch Linux Security Advisory ASA-202006-12 ========================================== Severity: High Date : 2020-06-28 CVE-ID : CVE-2020-6509 Package : chromium Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-1192 Summary ======= The package chromium before version 83.0.4103.116-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 83.0.4103.116-1. # pacman -Syu "chromium>=83.0.4103.116-1" The problem has been fixed upstream in version 83.0.4103.116. Workaround ========== None. Description =========== A use-after-free vulnerability has been found in the extensions component of chromium before 83.0.4103.116. Impact ====== A remote attacker can execute arbitrary code on the affected host. References ========== https://chromereleases.googleblog.com/2020/06/stable-chan... https://crbug.com/1092308 https://security.archlinux.org/CVE-2020-6509