Home / mailingsPDF  

[gentoo-announce] [ GLSA 202101-13 ] Chromium, Google Chrome: Multiple vulnerabilities

Posted on 22 January 2021
Gentoo-announce

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202101-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Chromium, Google Chrome: Multiple vulnerabilities
Date: January 22, 2021
Bugs: #766207
ID: 202101-13

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========
Multiple vulnerabilities have been found in Chromium and Google Chrome,
the worst of which could result in the arbitrary execution of code.

Background
==========
Chromium is an open-source browser project that aims to build a safer,
faster, and more stable way for all users to experience the web.

Google Chrome is one fast, simple, and secure browser for all your
devices.

Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/chromium < 88.0.4324.96 >= 88.0.4324.96
2 www-client/google-chrome
< 88.0.4324.96 >= 88.0.4324.96
-------------------------------------------------------------------
2 affected packages

Description
===========
Multiple vulnerabilities have been discovered in Chromium and Google
Chrome. Please review the CVE identifiers referenced below for details.

Impact
======
Please review the referenced CVE identifiers for details.

Workaround
==========
There is no known workaround at this time.

Resolution
==========
All Chromium users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot -v ">=www-client/chromium-88.0.4324.96"

All Google Chrome users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot -v ">=www-client/google-chrome-88.0.4324.96"

References
==========
[ 1 ] CVE-2020-16044
https://nvd.nist.gov/vuln/detail/CVE-2020-16044
[ 2 ] CVE-2021-21117
https://nvd.nist.gov/vuln/detail/CVE-2021-21117
[ 3 ] CVE-2021-21118
https://nvd.nist.gov/vuln/detail/CVE-2021-21118
[ 4 ] CVE-2021-21119
https://nvd.nist.gov/vuln/detail/CVE-2021-21119
[ 5 ] CVE-2021-21120
https://nvd.nist.gov/vuln/detail/CVE-2021-21120
[ 6 ] CVE-2021-21121
https://nvd.nist.gov/vuln/detail/CVE-2021-21121
[ 7 ] CVE-2021-21122
https://nvd.nist.gov/vuln/detail/CVE-2021-21122
[ 8 ] CVE-2021-21123
https://nvd.nist.gov/vuln/detail/CVE-2021-21123
[ 9 ] CVE-2021-21124
https://nvd.nist.gov/vuln/detail/CVE-2021-21124
[ 10 ] CVE-2021-21125
https://nvd.nist.gov/vuln/detail/CVE-2021-21125
[ 11 ] CVE-2021-21126
https://nvd.nist.gov/vuln/detail/CVE-2021-21126
[ 12 ] CVE-2021-21127
https://nvd.nist.gov/vuln/detail/CVE-2021-21127
[ 13 ] CVE-2021-21128
https://nvd.nist.gov/vuln/detail/CVE-2021-21128
[ 14 ] CVE-2021-21129
https://nvd.nist.gov/vuln/detail/CVE-2021-21129
[ 15 ] CVE-2021-21130
https://nvd.nist.gov/vuln/detail/CVE-2021-21130
[ 16 ] CVE-2021-21131
https://nvd.nist.gov/vuln/detail/CVE-2021-21131
[ 17 ] CVE-2021-21132
https://nvd.nist.gov/vuln/detail/CVE-2021-21132
[ 18 ] CVE-2021-21133
https://nvd.nist.gov/vuln/detail/CVE-2021-21133
[ 19 ] CVE-2021-21134
https://nvd.nist.gov/vuln/detail/CVE-2021-21134
[ 20 ] CVE-2021-21135
https://nvd.nist.gov/vuln/detail/CVE-2021-21135
[ 21 ] CVE-2021-21136
https://nvd.nist.gov/vuln/detail/CVE-2021-21136
[ 22 ] CVE-2021-21137
https://nvd.nist.gov/vuln/detail/CVE-2021-21137
[ 23 ] CVE-2021-21138
https://nvd.nist.gov/vuln/detail/CVE-2021-21138
[ 24 ] CVE-2021-21139
https://nvd.nist.gov/vuln/detail/CVE-2021-21139
[ 25 ] CVE-2021-21140
https://nvd.nist.gov/vuln/detail/CVE-2021-21140
[ 26 ] CVE-2021-21141
https://nvd.nist.gov/vuln/detail/CVE-2021-21141

Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202101-13

Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5


--LJLQJGQ7xxOGaZTy
Content-Type: application/pgp-signature; name="signature.asc"

 

TOP