[ASA-201711-12] chromium: arbitrary code execution

2017-11-07T00:00:00
ID ASA-201711-12
Type archlinux
Reporter ArchLinux
Modified 2017-11-07T00:00:00

Description

Arch Linux Security Advisory ASA-201711-12

Severity: Critical Date : 2017-11-07 CVE-ID : CVE-2017-15398 CVE-2017-15399 Package : chromium Type : arbitrary code execution Remote : Yes Link : https://security.archlinux.org/AVG-482

Summary

The package chromium before version 62.0.3202.89-1 is vulnerable to arbitrary code execution.

Resolution

Upgrade to 62.0.3202.89-1.

pacman -Syu "chromium>=62.0.3202.89-1"

The problems have been fixed upstream in version 62.0.3202.89.

Workaround

None.

Description

  • CVE-2017-15398 (arbitrary code execution)

A stack-based buffer overflow has been found in the QUIC component of the Chromium browser before 62.0.3202.89.

  • CVE-2017-15399 (arbitrary code execution)

A use-after-free has been found in the V8 component of the Chromium browser before 62.0.3202.89.

Impact

A remote attacker can execute arbitrary code on the affected host.

References

https://chromereleases.googleblog.com/2017/11/stable-channel-update-for-desktop.html https://bugs.chromium.org/p/chromium/issues/detail?id=777728 https://bugs.chromium.org/p/chromium/issues/detail?id=776677 https://security.archlinux.org/CVE-2017-15398 https://security.archlinux.org/CVE-2017-15399