ALT-BU-2020-3694-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-02164
Уязвимость системы управления конфигурациями Ansible, связана с раскрытием информации через регистрационные файлы, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-02200
Уязвимость системы управления конфигурациями Ansible, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-03324
Уязвимость модулей Splunk и Sumologic системы управления конфигурациями Ansible, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05681
Уязвимость модуля win_unzip системы управления конфигурациями Ansible, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-05829
Уязвимость системы управления конфигурациями Ansible, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
BDU:2021-03714
Уязвимость модуля solaris_zone системы управления конфигурациями Ansible, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00282
Уязвимость системы управления конфигурациями Ansible, связанная с небезопасными временными файлами, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00284
Уязвимость модуля svn системы управления конфигурациями Ansible, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2022-03971
Уязвимость модуля nxos_file_copy системы управления конфигурациями Ansible, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2019-14846
In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0523
- openSUSE-SU-2020:0523
- RHSA-2019:3201
- RHSA-2019:3201
- RHSA-2019:3202
- RHSA-2019:3202
- RHSA-2019:3203
- RHSA-2019:3203
- RHSA-2019:3207
- RHSA-2019:3207
- RHSA-2020:0756
- RHSA-2020:0756
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846
- https://github.com/ansible/ansible/pull/63366
- https://github.com/ansible/ansible/pull/63366
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2019-14856
ansible before versions 2.8.6, 2.7.14, 2.6.20 is vulnerable to a None
Modified: 2024-11-21
CVE-2019-14864
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0523
- openSUSE-SU-2020:0523
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864
- https://github.com/ansible/ansible/issues/63522
- https://github.com/ansible/ansible/issues/63522
- https://github.com/ansible/ansible/pull/63527
- https://github.com/ansible/ansible/pull/63527
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2019-14904
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
- https://bugzilla.redhat.com/show_bug.cgi?id=1776944
- https://bugzilla.redhat.com/show_bug.cgi?id=1776944
- https://github.com/ansible/ansible/pull/65686
- https://github.com/ansible/ansible/pull/65686
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2019-14905
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0523
- openSUSE-SU-2020:0523
- RHSA-2020:0216
- RHSA-2020:0216
- RHSA-2020:0218
- RHSA-2020:0218
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905
- FEDORA-2020-2bed89517f
- FEDORA-2020-2bed89517f
Modified: 2024-11-21
CVE-2020-10684
A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684
- FEDORA-2020-3990f03ba3
- FEDORA-2020-f80154b5b4
- FEDORA-2020-1b6ce91e37
- GLSA-202006-11
- DSA-4950
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684
- DSA-4950
- GLSA-202006-11
- FEDORA-2020-1b6ce91e37
- FEDORA-2020-f80154b5b4
- FEDORA-2020-3990f03ba3
Modified: 2024-11-21
CVE-2020-1733
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733
- https://github.com/ansible/ansible/issues/67791
- https://github.com/ansible/ansible/issues/67791
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- FEDORA-2020-3990f03ba3
- FEDORA-2020-3990f03ba3
- FEDORA-2020-f80154b5b4
- FEDORA-2020-f80154b5b4
- FEDORA-2020-1b6ce91e37
- FEDORA-2020-1b6ce91e37
- GLSA-202006-11
- GLSA-202006-11
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2020-1737
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737
- https://github.com/ansible/ansible/issues/67795
- https://github.com/ansible/ansible/issues/67795
- FEDORA-2020-a3f12bcff4
- FEDORA-2020-a3f12bcff4
- FEDORA-2020-0cab7041f7
- FEDORA-2020-0cab7041f7
- FEDORA-2020-87f5e1e829
- FEDORA-2020-87f5e1e829
- GLSA-202006-11
- GLSA-202006-11
Modified: 2024-11-21
CVE-2020-1738
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
Modified: 2024-11-21
CVE-2020-1739
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739
- https://github.com/ansible/ansible/issues/67797
- https://github.com/ansible/ansible/issues/67797
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- FEDORA-2020-a3f12bcff4
- FEDORA-2020-a3f12bcff4
- FEDORA-2020-0cab7041f7
- FEDORA-2020-0cab7041f7
- FEDORA-2020-87f5e1e829
- FEDORA-2020-87f5e1e829
- DSA-4950
- DSA-4950
Closed bugs
opus version is unknown
Closed vulnerabilities
BDU:2019-00428
Уязвимость библиотеки межклиентского обмена данными (ICE) X11 libICE, связанная с использованием слабого источника энтропии при генерации ключей, позволяющая нарушителю перехватить сеанс
Modified: 2024-11-21
CVE-2017-2626
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
- [oss-security] 20190714 Fwd: [ANNOUNCE] libICE 1.0.10
- [oss-security] 20190714 Fwd: [ANNOUNCE] libICE 1.0.10
- 96480
- 96480
- 1037919
- 1037919
- RHSA-2017:1865
- RHSA-2017:1865
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2626
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2626
- https://cgit.freedesktop.org/xorg/lib/libICE/commit/?id=ff5e59f32255913bb1cdf51441b98c9107ae165b
- https://cgit.freedesktop.org/xorg/lib/libICE/commit/?id=ff5e59f32255913bb1cdf51441b98c9107ae165b
- [debian-lts-announce] 20191123 [SECURITY] [DLA 2002-1] libice security update
- [debian-lts-announce] 20191123 [SECURITY] [DLA 2002-1] libice security update
- GLSA-201704-03
- GLSA-201704-03
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
Closed bugs
Не собран pytnon module
Closed vulnerabilities
BDU:2020-00867
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-01341
Уязвимость функции xsltCopyText (transform.c) библиотеки libxslt, позволяющая нарушителю выполнить произвольный код
BDU:2020-01434
Уязвимость функции flattenSubquery() системы управления базами данных SQLite, связанная с разыменованием указателя null, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01452
Уязвимость функции sqlite3WindowRewrite системы управления базами данных SQLite, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01453
Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику оказать воздействие на целостность данных
BDU:2020-01460
Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01476
Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность
BDU:2020-01477
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с чтение за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01479
Уязвимость графической библиотеки Skia браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность
BDU:2020-01483
Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных
BDU:2020-01487
Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, связанная с использованием неинициализированного ресурса, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01489
Уязвимость компонента AppCache браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01493
Уязвимость реализации механизма CORS браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01495
Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику нарушить целостность данных
BDU:2020-01498
Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01502
Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая злоумышленнику нарушить целостность данных
BDU:2020-01503
Уязвимость браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01506
Уязвимость компонента SQLite браузера Google Chrome, связанная с чтением за границами буфера, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01509
Уязвимость браузера Google Chrome, связанная с использованием после освобождения, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01511
Уязвимость реализации механизма CORS браузера Google Chrome, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01518
Уязвимость адресной строки Omnibox браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность
BDU:2020-01519
Уязвимость компонента SQLite браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01522
Уязвимость браузера Google Chrome, связанная с выходом операций за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01748
Уязвимость функции zipfileUpdate() системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01911
Уязвимость браузера Google Chrome, связанная с записью за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-01967
Уязвимость браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
BDU:2020-01968
Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
BDU:2020-01969
Уязвимость компонента V8 браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
BDU:2020-02034
Уязвимость функции UnicodeString::doAppend (unistr.cpp) библиотеки International Components for Unicode, связанная с целочисленным переполнением структуры данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
BDU:2020-02857
Уязвимость подсистемы media браузера Google Chrome, позволяющая нарушителю обойти политику безопасности контента
BDU:2021-03818
Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности при помощи специально созданного доменного имени
BDU:2021-03846
Уязвимость службы Safe Browsing веб-браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности
Modified: 2024-11-21
CVE-2019-18197
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0731
- openSUSE-SU-2020:0731
- [oss-security] 20191117 Nokogiri security update v1.10.5
- [oss-security] 20191117 Nokogiri security update v1.10.5
- RHSA-2020:0514
- RHSA-2020:0514
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914
- https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285
- https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285
- [debian-lts-announce] 20191027 [SECURITY] [DLA 1973-1] libxslt security update
- [debian-lts-announce] 20191027 [SECURITY] [DLA 1973-1] libxslt security update
- https://security.netapp.com/advisory/ntap-20191031-0004/
- https://security.netapp.com/advisory/ntap-20191031-0004/
- https://security.netapp.com/advisory/ntap-20200416-0004/
- https://security.netapp.com/advisory/ntap-20200416-0004/
- USN-4164-1
- USN-4164-1
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-19923
flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35
- https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35
- https://security.netapp.com/advisory/ntap-20200114-0003/
- https://security.netapp.com/advisory/ntap-20200114-0003/
- USN-4298-1
- USN-4298-1
- DSA-4638
- DSA-4638
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-19925
zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618
- https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618
- https://security.netapp.com/advisory/ntap-20200114-0003/
- https://security.netapp.com/advisory/ntap-20200114-0003/
- USN-4298-1
- USN-4298-1
- DSA-4638
- DSA-4638
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2019-19926
multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0189
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089
- https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089
- https://security.netapp.com/advisory/ntap-20200114-0003/
- https://security.netapp.com/advisory/ntap-20200114-0003/
- USN-4298-1
- USN-4298-1
- USN-4298-2
- USN-4298-2
- DSA-4638
- DSA-4638
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2020-10531
An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
- openSUSE-SU-2020:0459
- RHSA-2020:0738
- https://bugs.chromium.org/p/chromium/issues/detail?id=1044570
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html
- https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08
- https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca
- https://github.com/unicode-org/icu/pull/971
- [debian-lts-announce] 20200320 [SECURITY] [DLA 2151-1] icu security update
- FEDORA-2020-43d5a372fc
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- GLSA-202003-15
- https://unicode-org.atlassian.net/browse/ICU-20958
- USN-4305-1
- DSA-4646
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- openSUSE-SU-2020:0459
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- DSA-4646
- USN-4305-1
- https://unicode-org.atlassian.net/browse/ICU-20958
- GLSA-202003-15
- FEDORA-2020-f6271d7afa
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-43d5a372fc
- [debian-lts-announce] 20200320 [SECURITY] [DLA 2151-1] icu security update
- https://github.com/unicode-org/icu/pull/971
- https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca
- https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html
- https://bugs.chromium.org/p/chromium/issues/detail?id=1044570
- RHSA-2020:0738
Modified: 2024-11-21
CVE-2020-6381
Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1034394
- https://crbug.com/1034394
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6382
Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1031909
- https://crbug.com/1031909
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6383
Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- RHSA-2020:0738
- RHSA-2020:0738
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_18.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_18.html
- https://crbug.com/1051017
- https://crbug.com/1051017
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6384
Use after free in WebAudio in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- RHSA-2020:0738
- RHSA-2020:0738
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_18.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_18.html
- https://crbug.com/1048473
- https://crbug.com/1048473
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6385
Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1035399
- https://crbug.com/1035399
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6386
Use after free in speech in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- RHSA-2020:0738
- RHSA-2020:0738
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_18.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_18.html
- https://crbug.com/1043603
- https://crbug.com/1043603
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6387
Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1042535
- https://crbug.com/1042535
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6388
Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- http://packetstormsecurity.com/files/157376/Chrome-AudioArray-Allocate-Data-Race-Out-Of-Bounds-Access.html
- http://packetstormsecurity.com/files/157376/Chrome-AudioArray-Allocate-Data-Race-Out-Of-Bounds-Access.html
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1042879
- https://crbug.com/1042879
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6389
Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1042933
- https://crbug.com/1042933
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6390
Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- http://packetstormsecurity.com/files/157419/Chrome-ReadableStream-Close-Out-Of-Bounds-Access.html
- http://packetstormsecurity.com/files/157419/Chrome-ReadableStream-Close-Out-Of-Bounds-Access.html
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1045874
- https://crbug.com/1045874
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6391
Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1017871
- https://crbug.com/1017871
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6392
Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1030411
- https://crbug.com/1030411
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6393
Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1035058
- https://crbug.com/1035058
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6394
Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1014371
- https://crbug.com/1014371
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6395
Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1022855
- https://crbug.com/1022855
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6396
Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1035271
- https://crbug.com/1035271
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6397
Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1027408
- https://crbug.com/1027408
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6398
Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1032090
- https://crbug.com/1032090
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6399
Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1039869
- https://crbug.com/1039869
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6400
Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1038036
- https://crbug.com/1038036
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6401
Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1017707
- https://crbug.com/1017707
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6402
Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1029375
- https://crbug.com/1029375
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6403
Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1006012
- https://crbug.com/1006012
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6404
Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1024256
- https://crbug.com/1024256
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6405
Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1042145
- https://crbug.com/1042145
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6406
Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1042254
- https://crbug.com/1042254
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6407
Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- RHSA-2020:0738
- RHSA-2020:0738
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html
- https://crbug.com/1045931
- https://crbug.com/1045931
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6408
Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1026546
- https://crbug.com/1026546
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6409
Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1037889
- https://crbug.com/1037889
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6410
Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/881675
- https://crbug.com/881675
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6411
Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/929711
- https://crbug.com/929711
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6412
Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/968505
- https://crbug.com/968505
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6413
Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1005713
- https://crbug.com/1005713
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6414
Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1021855
- https://crbug.com/1021855
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6415
Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1029576
- https://crbug.com/1029576
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6416
Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1031895
- https://crbug.com/1031895
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6417
Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0210
- openSUSE-SU-2020:0233
- openSUSE-SU-2020:0233
- RHSA-2020:0514
- RHSA-2020:0514
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- https://crbug.com/1033824
- https://crbug.com/1033824
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
Modified: 2024-11-21
CVE-2020-6418
Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html
- http://packetstormsecurity.com/files/156632/Google-Chrome-80-JSCreate-Side-Effect-Type-Confusion.html
- RHSA-2020:0738
- RHSA-2020:0738
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html
- https://crbug.com/1053604
- https://crbug.com/1053604
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-f6271d7afa
- FEDORA-2020-f6271d7afa
- GLSA-202003-08
- GLSA-202003-08
- DSA-4638
- DSA-4638
Modified: 2024-11-21
CVE-2020-6420
Insufficient policy enforcement in media in Google Chrome prior to 80.0.3987.132 allowed a remote attacker to bypass same origin policy via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-6499
Inappropriate implementation in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass AppCache security restrictions via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-6500
Inappropriate implementation in interstitials in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-6501
Insufficient policy enforcement in CSP in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-6502
Incorrect implementation in permissions in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.
Package kernel-image-un-def updated to version 5.5.9-alt1 for branch sisyphus in task 247712.
Closed vulnerabilities
BDU:2020-00785
Уязвимость функции vc_do_resize ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-00786
Уязвимость функции vgacon_invert_region ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-00787
Уязвимость функции n_tty_receive_buf_common ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-8647
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.
- openSUSE-SU-2020:0388
- openSUSE-SU-2020:0388
- https://bugzilla.kernel.org/show_bug.cgi?id=206359
- https://bugzilla.kernel.org/show_bug.cgi?id=206359
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- DSA-4698
- DSA-4698
Modified: 2024-11-21
CVE-2020-8648
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- https://bugzilla.kernel.org/show_bug.cgi?id=206361
- https://bugzilla.kernel.org/show_bug.cgi?id=206361
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://security.netapp.com/advisory/ntap-20200924-0004/
- https://security.netapp.com/advisory/ntap-20200924-0004/
- USN-4342-1
- USN-4342-1
- USN-4344-1
- USN-4344-1
- USN-4345-1
- USN-4345-1
- USN-4346-1
- USN-4346-1
- DSA-4698
- DSA-4698
Modified: 2024-11-21
CVE-2020-8649
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.
- openSUSE-SU-2020:0388
- openSUSE-SU-2020:0388
- https://bugzilla.kernel.org/show_bug.cgi?id=206357
- https://bugzilla.kernel.org/show_bug.cgi?id=206357
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- DSA-4698
- DSA-4698
Closed vulnerabilities
BDU:2019-03640
Уязвимость средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, связанная с ошибками управления генерацией кода, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-14271
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
- openSUSE-SU-2019:2021
- openSUSE-SU-2019:2021
- https://docs.docker.com/engine/release-notes/
- https://docs.docker.com/engine/release-notes/
- https://github.com/moby/moby/issues/39449
- https://github.com/moby/moby/issues/39449
- 20190910 [SECURITY] [DSA 4521-1] docker.io security update
- 20190910 [SECURITY] [DSA 4521-1] docker.io security update
- https://security.netapp.com/advisory/ntap-20190828-0003/
- https://security.netapp.com/advisory/ntap-20190828-0003/
- DSA-4521
- DSA-4521
Package partitionmanager updated to version 4.1.0-alt2 for branch sisyphus in task 247733.
Closed bugs
Ошибка сегментирования при запуске partitionmanager
Package firefox-esr updated to version 68.6.0-alt1 for branch sisyphus in task 247676.
Closed vulnerabilities
BDU:2020-01115
Уязвимость веб-браузеров Firefox ESR и Firefox, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2020-01910
Уязвимость функции sctp_load_addresses_from_init реализации протокола передачи сообщений с поддержкой множественной адресации usrsctp, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03817
Уязвимость компонент BodyStream::OnInputStreamReady браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2019-20503
usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
- openSUSE-SU-2020:0340
- openSUSE-SU-2020:0340
- openSUSE-SU-2020:0365
- openSUSE-SU-2020:0365
- openSUSE-SU-2020:0366
- openSUSE-SU-2020:0366
- openSUSE-SU-2020:0389
- openSUSE-SU-2020:0389
- 20200529 APPLE-SA-2020-05-26-1 iOS 13.5 and iPadOS 13.5
- 20200529 APPLE-SA-2020-05-26-1 iOS 13.5 and iPadOS 13.5
- 20200529 APPLE-SA-2020-05-26-7 Safari 13.1.1
- 20200529 APPLE-SA-2020-05-26-7 Safari 13.1.1
- 20200529 APPLE-SA-2020-05-26-5 watchOS 6.2.5
- 20200529 APPLE-SA-2020-05-26-5 watchOS 6.2.5
- 20200529 APPLE-SA-2020-05-26-4 tvOS 13.4.5
- 20200529 APPLE-SA-2020-05-26-4 tvOS 13.4.5
- RHSA-2020:0815
- RHSA-2020:0815
- RHSA-2020:0816
- RHSA-2020:0816
- RHSA-2020:0819
- RHSA-2020:0819
- RHSA-2020:0820
- RHSA-2020:0820
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1992
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1992
- https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html
- https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html
- https://crbug.com/1059349
- https://crbug.com/1059349
- https://github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467
- https://github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467
- [debian-lts-announce] 20200311 [SECURITY] [DLA 2140-1] firefox-esr security update
- [debian-lts-announce] 20200311 [SECURITY] [DLA 2140-1] firefox-esr security update
- [debian-lts-announce] 20200320 [SECURITY] [DLA 2150-1] thunderbird security update
- [debian-lts-announce] 20200320 [SECURITY] [DLA 2150-1] thunderbird security update
- [debian-lts-announce] 20230706 [SECURITY] [DLA 3481-1] libusrsctp security update
- [debian-lts-announce] 20230706 [SECURITY] [DLA 3481-1] libusrsctp security update
- FEDORA-2020-17149a4f3d
- FEDORA-2020-17149a4f3d
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-7fd051b378
- FEDORA-2020-7fd051b378
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- https://support.apple.com/HT211168
- https://support.apple.com/HT211168
- https://support.apple.com/HT211171
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211175
- https://support.apple.com/HT211177
- https://support.apple.com/HT211177
- https://support.apple.com/kb/HT211168
- https://support.apple.com/kb/HT211168
- https://support.apple.com/kb/HT211171
- https://support.apple.com/kb/HT211171
- https://support.apple.com/kb/HT211175
- https://support.apple.com/kb/HT211175
- https://support.apple.com/kb/HT211177
- https://support.apple.com/kb/HT211177
- USN-4299-1
- USN-4299-1
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- DSA-4639
- DSA-4639
- DSA-4642
- DSA-4642
- DSA-4645
- DSA-4645
Modified: 2024-11-21
CVE-2020-6805
When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1610880
- https://bugzilla.mozilla.org/show_bug.cgi?id=1610880
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6806
By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
- http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1612308
- https://bugzilla.mozilla.org/show_bug.cgi?id=1612308
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6807
When a device was changed while a stream was about to be destroyed, the stream-reinit
task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1614971
- https://bugzilla.mozilla.org/show_bug.cgi?id=1614971
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6811
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1607742
- https://bugzilla.mozilla.org/show_bug.cgi?id=1607742
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6812
The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1616661
- https://bugzilla.mozilla.org/show_bug.cgi?id=1616661
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6814
Mozilla developers reported memory safety bugs present in Firefox and Thunderbird 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Closed vulnerabilities
BDU:2022-00215
Уязвимость программы для анализа трафика wireshark, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-00217
Уязвимость программы для анализа трафика wireshark, связанная с неправильным освобождением памяти перед удалением последний ссылки, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-00253
Уязвимость программы для анализа трафика wireshark, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-9428
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16397
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16397
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9fe2de783dbcbe74144678d60a4e3923367044b2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9fe2de783dbcbe74144678d60a4e3923367044b2
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2020-ef943221ca
- FEDORA-2020-ef943221ca
- FEDORA-2020-87737529a4
- FEDORA-2020-87737529a4
- FEDORA-2020-da7dcee2ec
- FEDORA-2020-da7dcee2ec
- GLSA-202007-13
- GLSA-202007-13
- https://www.wireshark.org/security/wnpa-sec-2020-05.html
- https://www.wireshark.org/security/wnpa-sec-2020-05.html
Modified: 2024-11-21
CVE-2020-9430
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the WiMax DLMAP dissector could crash. This was addressed in plugins/epan/wimax/msg_dlmap.c by validating a length field.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16368
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16368
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16383
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16383
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6b98dc63701b1da1cc7681cb383dabb0b7007d73
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6b98dc63701b1da1cc7681cb383dabb0b7007d73
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=93d6b03a67953b82880cdbdcf0d30e2a3246d790
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=93d6b03a67953b82880cdbdcf0d30e2a3246d790
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2020-ef943221ca
- FEDORA-2020-ef943221ca
- FEDORA-2020-87737529a4
- FEDORA-2020-87737529a4
- FEDORA-2020-da7dcee2ec
- FEDORA-2020-da7dcee2ec
- GLSA-202007-13
- GLSA-202007-13
- https://www.wireshark.org/security/wnpa-sec-2020-04.html
- https://www.wireshark.org/security/wnpa-sec-2020-04.html
Modified: 2024-11-21
CVE-2020-9431
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16341
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16341
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=086003c9d616906e08bbeeab9c17b3aa4c6ff850
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=086003c9d616906e08bbeeab9c17b3aa4c6ff850
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2020-ef943221ca
- FEDORA-2020-ef943221ca
- FEDORA-2020-87737529a4
- FEDORA-2020-87737529a4
- FEDORA-2020-da7dcee2ec
- FEDORA-2020-da7dcee2ec
- GLSA-202007-13
- GLSA-202007-13
- https://www.wireshark.org/security/wnpa-sec-2020-03.html
- https://www.wireshark.org/security/wnpa-sec-2020-03.html
Package kde5-okular updated to version 19.12.3-alt1 for branch sisyphus in task 247698.
Closed vulnerabilities
BDU:2021-01695
Уязвимость программного обеспечения для просмотра PDF-документов Okular, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-9359
KDE Okular before 1.10.0 allows code execution via an action link in a PDF document.
- https://invent.kde.org/kde/okular/-/commit/6a93a033b4f9248b3cd4d04689b8391df754e244
- https://invent.kde.org/kde/okular/-/commit/6a93a033b4f9248b3cd4d04689b8391df754e244
- https://kde.org/info/security/advisory-20200312-1.txt
- https://kde.org/info/security/advisory-20200312-1.txt
- [debian-lts-announce] 20200325 [SECURITY] [DLA 2159-1] okular security update
- [debian-lts-announce] 20200325 [SECURITY] [DLA 2159-1] okular security update
- [debian-lts-announce] 20211227 [SECURITY] [DLA 2856-1] okular security update
- [debian-lts-announce] 20211227 [SECURITY] [DLA 2856-1] okular security update
- FEDORA-2020-7036f54316
- FEDORA-2020-7036f54316
- FEDORA-2020-dcde488e68
- FEDORA-2020-dcde488e68
- FEDORA-2020-e35573f7df
- FEDORA-2020-e35573f7df
- GLSA-202007-47
- GLSA-202007-47