Arch Linux 754 Published by

A chromium security update has been released for Arch Linux.



ASA-202103-9: chromium: arbitrary code execution


Arch Linux Security Advisory ASA-202103-9
========================================
Severity: High
Date : 2021-03-13
CVE-ID : CVE-2021-21191 CVE-2021-21192 CVE-2021-21193
Package : chromium
Type : arbitrary code execution
Remote : Yes
Link :   https://security.archlinux.org/AVG-1683

Summary
======
The package chromium before version 89.0.4389.90-1 is vulnerable to
arbitrary code execution.

Resolution
=========
Upgrade to 89.0.4389.90-1.

# pacman -Syu "chromium>?.0.4389.90-1"

The problems have been fixed upstream in version 89.0.4389.90.

Workaround
=========
None.

Description
==========
- CVE-2021-21191 (arbitrary code execution)

A use after free security issue was found in the WebRTC component of
the Chromium browser before version 89.0.4389.90.

- CVE-2021-21192 (arbitrary code execution)

A heap buffer overflow security issue was found in the tab groups
component of the Chromium browser before version 89.0.4389.90.

- CVE-2021-21193 (arbitrary code execution)

A use after free security issue was found in the Blink component of the
Chromium browser before version 89.0.4389.90. Google is aware of
reports that an exploit for this issue exists in the wild.

Impact
=====
A remote attacker can execute arbitrary code on the affected host.
Google is aware of reports that an exploit for CVE-2021-21193 exists in
the wild.

References
=========
  https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html
  https://crbug.com/1167357
  https://crbug.com/1181387
  https://crbug.com/1186287
  https://security.archlinux.org/CVE-2021-21191
  https://security.archlinux.org/CVE-2021-21192
  https://security.archlinux.org/CVE-2021-21193