ALT-BU-2020-3946-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2020-04724
Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2020-04725
Уязвимость реализации WebAuthentication браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01461
Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01463
Уязвимость инструментов разработчика браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01464
Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01465
Уязвимость компонента Content Security Policy (CSP) браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01466
Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01467
Уязвимость компонента Skia браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01468
Уязвимость функции Автозаполнения браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01469
Уязвимость компонента CSP браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01470
Уязвимость компонента history браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01471
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01504
Уязвимость компонента PWAs браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01505
Уязвимость пользовательского интерфейса WebUI браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01506
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01507
Уязвимость реализации режима Scroll-To-Text браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01508
Уязвимость изолированной среды iframe браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01509
Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01510
Уязвимость реализации external protocol браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01511
Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01512
Уязвимость компонента developer tools браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01513
Уязвимость компонента Content Security Policy браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01514
Уязвимость компонента background fetch браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01749
Уязвимость реализация WebRTC веб-браузеров Google Chrome, Firefox, Firefox-ESR и почтового клиента Thunderbird, связанная с переполнением буфера кучи, позволяющая нарушителю нарушить целостность данных
BDU:2021-01752
Уязвимость расширений браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01753
Уязвимость компонента speech браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01754
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-03632
Уязвимость веб-браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-03633
Уязвимость реализации механизма CORS веб-браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03816
Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-00047
Уязвимость пользовательского интерфейса базовой аутентификации браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданной HTML страницы
Modified: 2024-11-21
CVE-2020-6492
Use after free in ANGLE in Google Chrome prior to 83.0.4103.97 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-6493
Use after free in WebAuthentication in Google Chrome prior to 83.0.4103.97 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:0823
- openSUSE-SU-2020:0823
- openSUSE-SU-2020:0832
- openSUSE-SU-2020:0832
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html
- https://crbug.com/1082105
- https://crbug.com/1082105
- GLSA-202006-02
- GLSA-202006-02
- DSA-4714
- DSA-4714
Modified: 2024-11-21
CVE-2020-6495
Insufficient policy enforcement in developer tools in Google Chrome prior to 83.0.4103.97 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
- openSUSE-SU-2020:0823
- openSUSE-SU-2020:0823
- openSUSE-SU-2020:0832
- openSUSE-SU-2020:0832
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html
- https://crbug.com/1072116
- https://crbug.com/1072116
- GLSA-202006-02
- GLSA-202006-02
- DSA-4714
- DSA-4714
Modified: 2024-11-21
CVE-2020-6505
Use after free in speech in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-6507
Out of bounds write in V8 in Google Chrome prior to 83.0.4103.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/162088/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162088/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162105/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162105/Google-Chrome-81.0.4044-V8-Remote-Code-Execution.html
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_15.html
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_15.html
- https://crbug.com/1086890
- https://crbug.com/1086890
- GLSA-202007-08
- GLSA-202007-08
Modified: 2024-11-21
CVE-2020-6509
Use after free in extensions in Google Chrome prior to 83.0.4103.116 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
- openSUSE-SU-2020:1032
- openSUSE-SU-2020:1032
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_22.html
- https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_22.html
- https://crbug.com/1092308
- https://crbug.com/1092308
- GLSA-202007-08
- GLSA-202007-08
Modified: 2024-11-21
CVE-2020-6510
Heap buffer overflow in background fetch in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1103195
- https://crbug.com/1103195
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6511
Information leak in content security policy in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1074317
- https://crbug.com/1074317
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6512
Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1084820
- https://crbug.com/1084820
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6513
Heap buffer overflow in PDFium in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1091404
- https://crbug.com/1091404
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1092
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1092
Modified: 2024-11-21
CVE-2020-6514
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1147
- openSUSE-SU-2020:1147
- openSUSE-SU-2020:1155
- openSUSE-SU-2020:1155
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1179
- openSUSE-SU-2020:1179
- openSUSE-SU-2020:1189
- openSUSE-SU-2020:1189
- openSUSE-SU-2020:1205
- openSUSE-SU-2020:1205
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.html
- http://packetstormsecurity.com/files/158697/WebRTC-usrsctp-Incorrect-Call.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1076703
- https://crbug.com/1076703
- [debian-lts-announce] 20200729 [SECURITY] [DLA 2297-1] firefox-esr security update
- [debian-lts-announce] 20200729 [SECURITY] [DLA 2297-1] firefox-esr security update
- [debian-lts-announce] 20200802 [SECURITY] [DLA 2310-1] thunderbird security update
- [debian-lts-announce] 20200802 [SECURITY] [DLA 2310-1] thunderbird security update
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202007-64
- GLSA-202007-64
- GLSA-202101-30
- GLSA-202101-30
- https://support.apple.com/kb/HT211288
- https://support.apple.com/kb/HT211288
- https://support.apple.com/kb/HT211290
- https://support.apple.com/kb/HT211290
- https://support.apple.com/kb/HT211291
- https://support.apple.com/kb/HT211291
- https://support.apple.com/kb/HT211292
- https://support.apple.com/kb/HT211292
- USN-4443-1
- USN-4443-1
- DSA-4736
- DSA-4736
- DSA-4740
- DSA-4740
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6515
Use after free in tab strip in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1082755
- https://crbug.com/1082755
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6516
Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1092449
- https://crbug.com/1092449
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6517
Heap buffer overflow in history in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1095560
- https://crbug.com/1095560
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6518
Use after free in developer tools in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had convinced the user to use developer tools to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/986051
- https://crbug.com/986051
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6519
Policy bypass in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html
- http://packetstormsecurity.com/files/160353/Chromium-83-CSP-Bypass.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1064676
- https://crbug.com/1064676
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6520
Buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1092274
- https://crbug.com/1092274
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6521
Side-channel information leakage in autofill in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1075734
- https://crbug.com/1075734
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6522
Inappropriate implementation in external protocol handlers in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1052093
- https://crbug.com/1052093
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6523
Out of bounds write in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1080481
- https://crbug.com/1080481
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6524
Heap buffer overflow in WebAudio in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1081722
- https://crbug.com/1081722
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6525
Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1091670
- https://crbug.com/1091670
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6526
Inappropriate implementation in iframe sandbox in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1074340
- https://crbug.com/1074340
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6527
Insufficient policy enforcement in CSP in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to bypass content security policy via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/992698
- https://crbug.com/992698
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6528
Incorrect security UI in basic auth in Google Chrome on iOS prior to 84.0.4147.89 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1063690
- https://crbug.com/1063690
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6529
Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/978779
- https://crbug.com/978779
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6530
Out of bounds memory access in developer tools in Google Chrome prior to 84.0.4147.89 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1016278
- https://crbug.com/1016278
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6531
Side-channel information leakage in scroll to text in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1042986
- https://crbug.com/1042986
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6533
Type Confusion in V8 in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1069964
- https://crbug.com/1069964
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6534
Heap buffer overflow in WebRTC in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1072412
- https://crbug.com/1072412
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6535
Insufficient data validation in WebUI in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had compromised the renderer process to inject scripts or HTML into a privileged page via a crafted HTML page.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1073409
- https://crbug.com/1073409
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6536
Incorrect security UI in PWAs in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had persuaded the user to install a PWA to spoof the contents of the Omnibox (URL bar) via a crafted PWA.
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1061
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1148
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1172
- openSUSE-SU-2020:1048
- openSUSE-SU-2020:1048
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html
- https://crbug.com/1080934
- https://crbug.com/1080934
- FEDORA-2020-bf684961d9
- FEDORA-2020-bf684961d9
- FEDORA-2020-84d87cbd50
- FEDORA-2020-84d87cbd50
- GLSA-202007-08
- GLSA-202007-08
- DSA-4824
- DSA-4824
Closed bugs
Падает на сайтах с multimedia
Closed vulnerabilities
BDU:2020-03143
Уязвимость средства защиты от вредоносного программного обеспечения Cisco AMP и средства антивирусной защиты Clam Antivirus, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю удалить произвольные файлы
Modified: 2024-11-21
CVE-2020-3327
A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-6584a641ae
- FEDORA-2020-6584a641ae
- FEDORA-2020-bca44487a1
- FEDORA-2020-bca44487a1
- FEDORA-2020-dd0c20d985
- FEDORA-2020-dd0c20d985
- FEDORA-2020-d98d2cbae1
- FEDORA-2020-d98d2cbae1
- GLSA-202007-23
- GLSA-202007-23
- USN-4370-1
- USN-4370-1
- USN-4370-2
- USN-4370-2
- USN-4435-1
- USN-4435-1
- USN-4435-2
- USN-4435-2
Modified: 2024-11-21
CVE-2020-3350
A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- FEDORA-2020-6584a641ae
- FEDORA-2020-6584a641ae
- FEDORA-2020-dd0c20d985
- FEDORA-2020-dd0c20d985
- GLSA-202007-23
- GLSA-202007-23
- 20200617 Cisco AMP for Endpoints and ClamAV Privilege Escalation Vulnerability
- 20200617 Cisco AMP for Endpoints and ClamAV Privilege Escalation Vulnerability
- USN-4435-1
- USN-4435-1
- USN-4435-2
- USN-4435-2
Modified: 2024-11-21
CVE-2020-3481
A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
- ClamAV 0.102.4 security patch released
- ClamAV 0.102.4 security patch released
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- FEDORA-2020-6584a641ae
- FEDORA-2020-6584a641ae
- FEDORA-2020-dd0c20d985
- FEDORA-2020-dd0c20d985
- GLSA-202007-23
- GLSA-202007-23
- USN-4435-1
- USN-4435-1
- USN-4435-2
- USN-4435-2