ALT-BU-2021-3707-1
Branch p9 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-8754
The libevt_record_values_read_event() function in libevt_record_values.c in libevt before 2018-03-17 does not properly check for out-of-bounds values of user SID data size, strings size, or data size. NOTE: the vendor has disputed this as described in libyal/libevt issue 5 on GitHub
Package firefox-esr updated to version 78.6.1-alt0.1.p9 for branch p9 in task 264322.
Closed vulnerabilities
BDU:2021-01188
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01239
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с записью данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-01240
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-01665
Уязвимость реализации блока COOKIE-ECHO расширения WebRTC браузеров Google Chrome, Mozilla Firefox, Firefox ESR и Firefox for Android, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2020-16042
Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16044
Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
Modified: 2024-11-21
CVE-2020-26971
Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1663466
- https://bugzilla.mozilla.org/show_bug.cgi?id=1663466
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-26973
Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1680084
- https://bugzilla.mozilla.org/show_bug.cgi?id=1680084
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-26974
When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1681022
- https://bugzilla.mozilla.org/show_bug.cgi?id=1681022
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-26978
Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1677047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1677047
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-35111
When an extension with the proxy permission registered to receive
- https://bugzilla.mozilla.org/show_bug.cgi?id=1657916
- https://bugzilla.mozilla.org/show_bug.cgi?id=1657916
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-35112
If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1661365
- https://bugzilla.mozilla.org/show_bug.cgi?id=1661365
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-35113
Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664831%2C1673589
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664831%2C1673589
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Closed bugs
обновление до версии 78.6.0
Closed vulnerabilities
BDU:2020-04787
Уязвимость браузера Firefox, связана с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2020-04788
Уязвимость компонента WebGL браузера Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2022-05797
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-05805
Уязвимость браузера Mozilla Firefox, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-05930
Уязвимость браузера Mozilla Firefox, связанная с ошибками управления ресурсом, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05932
Уязвимость браузера Mozilla Firefox, связанная с недостатком в механизме подтверждения источника данных, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2024-11-21
CVE-2020-15673
Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1785
- openSUSE-SU-2020:1785
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1648493%2C1660800
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1648493%2C1660800
- [debian-lts-announce] 20201016 [SECURITY] [DLA 2408-1] thunderbird security update
- [debian-lts-announce] 20201016 [SECURITY] [DLA 2408-1] thunderbird security update
- GLSA-202010-02
- GLSA-202010-02
- DSA-4770
- DSA-4770
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-44/
- https://www.mozilla.org/security/advisories/mfsa2020-44/
Modified: 2024-11-21
CVE-2020-15674
Mozilla developers reported memory safety bugs present in Firefox 80. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 81.
Modified: 2024-11-21
CVE-2020-15675
When processing surfaces, the lifetime may outlive a persistent buffer leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 81.
Modified: 2024-11-21
CVE-2020-15676
Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1785
- openSUSE-SU-2020:1785
- https://bugzilla.mozilla.org/show_bug.cgi?id=1646140
- https://bugzilla.mozilla.org/show_bug.cgi?id=1646140
- [debian-lts-announce] 20201016 [SECURITY] [DLA 2408-1] thunderbird security update
- [debian-lts-announce] 20201016 [SECURITY] [DLA 2408-1] thunderbird security update
- GLSA-202010-02
- GLSA-202010-02
- DSA-4770
- DSA-4770
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-44/
- https://www.mozilla.org/security/advisories/mfsa2020-44/
Modified: 2024-11-21
CVE-2020-15677
By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1785
- openSUSE-SU-2020:1785
- https://bugzilla.mozilla.org/show_bug.cgi?id=1641487
- https://bugzilla.mozilla.org/show_bug.cgi?id=1641487
- [debian-lts-announce] 20201016 [SECURITY] [DLA 2408-1] thunderbird security update
- [debian-lts-announce] 20201016 [SECURITY] [DLA 2408-1] thunderbird security update
- GLSA-202010-02
- GLSA-202010-02
- DSA-4770
- DSA-4770
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-44/
- https://www.mozilla.org/security/advisories/mfsa2020-44/
Modified: 2024-11-21
CVE-2020-15678
When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1785
- openSUSE-SU-2020:1785
- https://bugzilla.mozilla.org/show_bug.cgi?id=1660211
- https://bugzilla.mozilla.org/show_bug.cgi?id=1660211
- [debian-lts-announce] 20201016 [SECURITY] [DLA 2408-1] thunderbird security update
- [debian-lts-announce] 20201016 [SECURITY] [DLA 2408-1] thunderbird security update
- GLSA-202010-02
- GLSA-202010-02
- DSA-4770
- DSA-4770
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-42/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-43/
- https://www.mozilla.org/security/advisories/mfsa2020-44/
- https://www.mozilla.org/security/advisories/mfsa2020-44/
Modified: 2024-11-21
CVE-2020-15680
If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82.
Modified: 2024-11-21
CVE-2020-15681
When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 82.
Modified: 2024-11-21
CVE-2020-15682
When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing attack. This was fixed by changing external protocol prompts to be tab-modal while also ensuring they could not be incorrectly associated with a different origin. This vulnerability affects Firefox < 82.
Modified: 2024-11-21
CVE-2020-15683
Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.4, Firefox < 82, and Thunderbird < 78.4.
- openSUSE-SU-2020:1732
- openSUSE-SU-2020:1732
- openSUSE-SU-2020:1748
- openSUSE-SU-2020:1748
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1785
- openSUSE-SU-2020:1785
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140
- [debian-lts-announce] 20201027 [SECURITY] [DLA 2416-1] thunderbird security update
- [debian-lts-announce] 20201027 [SECURITY] [DLA 2416-1] thunderbird security update
- GLSA-202010-08
- GLSA-202010-08
- DSA-4780
- DSA-4780
- https://www.mozilla.org/security/advisories/mfsa2020-45/
- https://www.mozilla.org/security/advisories/mfsa2020-45/
- https://www.mozilla.org/security/advisories/mfsa2020-46/
- https://www.mozilla.org/security/advisories/mfsa2020-46/
- https://www.mozilla.org/security/advisories/mfsa2020-47/
- https://www.mozilla.org/security/advisories/mfsa2020-47/
Modified: 2024-11-21
CVE-2020-15684
Mozilla developers reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 82.
Modified: 2024-11-21
CVE-2020-26950
In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.
- http://packetstormsecurity.com/files/166175/Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free.html
- http://packetstormsecurity.com/files/166175/Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1675905
- https://bugzilla.mozilla.org/show_bug.cgi?id=1675905
- https://www.mozilla.org/security/advisories/mfsa2020-49/
- https://www.mozilla.org/security/advisories/mfsa2020-49/
Closed bugs
Старая версия Firefox в p9 для aarch64
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-28924
An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed.
Package spice-vdagent updated to version 0.21.0-alt1 for branch p9 in task 265015.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-25650
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.
- https://bugzilla.redhat.com/show_bug.cgi?id=1886345
- https://bugzilla.redhat.com/show_bug.cgi?id=1886345
- [debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update
- [debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update
- FEDORA-2021-510977db25
- FEDORA-2021-510977db25
- FEDORA-2021-09ce0cdfac
- FEDORA-2021-09ce0cdfac
- https://www.openwall.com/lists/oss-security/2020/11/04/1
- https://www.openwall.com/lists/oss-security/2020/11/04/1
Modified: 2024-11-21
CVE-2020-25651
A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
- https://bugzilla.redhat.com/show_bug.cgi?id=1886359
- https://bugzilla.redhat.com/show_bug.cgi?id=1886359
- [debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update
- [debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update
- FEDORA-2021-510977db25
- FEDORA-2021-510977db25
- FEDORA-2021-09ce0cdfac
- FEDORA-2021-09ce0cdfac
- https://www.openwall.com/lists/oss-security/2020/11/04/1
- https://www.openwall.com/lists/oss-security/2020/11/04/1
Modified: 2024-11-21
CVE-2020-25652
A flaw was found in the spice-vdagentd daemon, where it did not properly handle client connections that can be established via the UNIX domain socket in `/run/spice-vdagentd/spice-vdagent-sock`. Any unprivileged local guest user could use this flaw to prevent legitimate agents from connecting to the spice-vdagentd daemon, resulting in a denial of service. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and prior.
- https://bugzilla.redhat.com/show_bug.cgi?id=1886366
- https://bugzilla.redhat.com/show_bug.cgi?id=1886366
- [debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update
- [debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update
- FEDORA-2021-510977db25
- FEDORA-2021-510977db25
- FEDORA-2021-09ce0cdfac
- FEDORA-2021-09ce0cdfac
- https://www.openwall.com/lists/oss-security/2020/11/04/1
- https://www.openwall.com/lists/oss-security/2020/11/04/1
Modified: 2024-11-21
CVE-2020-25653
A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections. This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting in a denial of service or information leakage from the host. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
- https://bugzilla.redhat.com/show_bug.cgi?id=1886372
- https://bugzilla.redhat.com/show_bug.cgi?id=1886372
- [debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update
- [debian-lts-announce] 20210113 [SECURITY] [DLA 2524-1] spice-vdagent security update
- FEDORA-2021-510977db25
- FEDORA-2021-510977db25
- FEDORA-2021-09ce0cdfac
- FEDORA-2021-09ce0cdfac
- https://www.openwall.com/lists/oss-security/2020/11/04/1
- https://www.openwall.com/lists/oss-security/2020/11/04/1
Package containerd updated to version 1.3.9-alt1 for branch p9 in task 265084.
Closed vulnerabilities
BDU:2021-01907
Уязвимость среды выполнения контейнеров Containerd, связанная с отсутствием проверки привилегий контейнеров c UID 0 в том же пространстве имен, что и shim, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2020-15257
containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim’s API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise reduced privileges, to cause new processes to be run with elevated privileges. This vulnerability has been fixed in containerd 1.3.9 and 1.4.3. Users should update to these versions as soon as they are released. It should be noted that containers started with an old version of containerd-shim should be stopped and restarted, as running containers will continue to be vulnerable even after an upgrade. If you are not providing the ability for untrusted users to start containers in the same network namespace as the shim (typically the "host" network namespace, for example with docker run --net=host or hostNetwork: true in a Kubernetes pod) and run with an effective UID of 0, you are not vulnerable to this issue. If you are running containers with a vulnerable configuration, you can deny access to all abstract sockets with AppArmor by adding a line similar to deny unix addr=@**, to your policy. It is best practice to run containers with a reduced set of privileges, with a non-zero UID, and with isolated namespaces. The containerd maintainers strongly advise against sharing namespaces with the host. Reducing the set of isolation mechanisms used for a container necessarily increases that container's privilege, regardless of what container runtime is used for running that container.
- https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad
- https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad
- https://github.com/containerd/containerd/releases/tag/v1.4.3
- https://github.com/containerd/containerd/releases/tag/v1.4.3
- https://github.com/containerd/containerd/security/advisories/GHSA-36xw-fx78-c5r4
- https://github.com/containerd/containerd/security/advisories/GHSA-36xw-fx78-c5r4
- FEDORA-2020-baeb8dbaea
- FEDORA-2020-baeb8dbaea
- GLSA-202105-33
- GLSA-202105-33
- DSA-4865
- DSA-4865
Closed vulnerabilities
BDU:2020-05101
Уязвимость интерфейса пользователя браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-05105
Уязвимость графического движка ANGLE браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-05106
Уязвимость реализации движка V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-05107
Уязвимость браузера Google Chrome, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю повысить свои привилегии
BDU:2020-05108
Уязвимость расширения WebRTC браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-05109
Уязвимость реализации движка V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-05385
Уязвимость библиотеки FreeType браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2020-05604
Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05605
Уязвимость пользовательского интерфейса веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05606
Уязвимость механизма отображения веб-страниц Blink веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05607
Уязвимость функции печати веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05609
Уязвимость проигрывателя Adobe Flash Player веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05610
Уязвимость файловой системы веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05611
Уязвимость компонента Cryptohome веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05612
Уязвимость компонента ImageBurner веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05613
Уязвимость компонента Networking веб-браузера Google Chrome, позволяющая нарушителю повысить свои привилегии
BDU:2020-05614
Уязвимость компонента WebCodecs веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05615
Уязвимость буфера обмена веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05616
Уязвимость реализации технологии WebRTC веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05617
Уязвимость инструментов разработчика веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05618
Уязвимость реализации технологии WebRTC веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05619
Уязвимость реализации PPAPI веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05620
Уязвимость реализации технологии WASM веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05621
Уязвимость компонента Payments веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05623
Уязвимость компонента Networking веб-браузера Google Chrome, позволяющая нарушителю осуществить подмену домена
BDU:2020-05624
Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05625
Уязвимость компонента Networking веб-браузера Google Chrome, позволяющая нарушителю повысить свои привилегии
BDU:2020-05626
Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05627
Уязвимость функции изоляции сайтов веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05628
Уязвимость компонента base веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2020-05629
Уязвимость функции совместного использования экрана веб-браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки
BDU:2020-05630
Уязвимость реализации протокола WebUSB веб-браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки
BDU:2020-05631
Уязвимость функции предварительного просмотра вкладки веб-браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки
BDU:2020-05632
Уязвимость реализации технологии WebRTC веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2020-05633
Уязвимость компонента cros-disks веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05634
Уязвимость механизма обработки файлов cookie веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-00107
Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00108
Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00109
Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00110
Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00111
Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00112
Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00113
Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00114
Уязвимость браузера Google Chrome, связанная с записью данных за пределами буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00115
Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00116
Уязвимость браузера Google Chrome, связанная с ошибками разграничения доступа, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00117
Уязвимость браузера Google Chrome, связанная с использованием памяти после ее освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00200
Уязвимость веб-интерфейса браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01188
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01431
Уязвимость компонента audio браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01432
Уязвимость компонента media браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01458
Уязвимость хранилища браузера Google Chrome, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01474
Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01475
Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01476
Уязвимость компонента autofill браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01477
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01478
Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01484
Уязвимость компонента WebXR браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01485
Уязвимость компонента audio браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01486
Уязвимость реализации технологии WebRTC программных средств Google Chrome, Firefox, Firefox-ESR и Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01487
Уязвимость расширений браузера Google Chrome, связанная с недостатками разграничения доступа к некоторым функциям, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01488
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01489
Уязвимость расширений браузера Google Chrome, связанная с недостатками разграничения доступа к некоторым функциям, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01490
Уязвимость расширений браузера Google Chrome, связанная с недостатками разграничения доступа к некоторым функциям, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01491
Уязвимость компонента networking браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01499
Уязвимость компонента scheduling браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01500
Уязвимость компонента IndexedDB браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01501
Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01502
Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01515
Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01516
Уязвимость менеджера паролей браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01517
Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01518
Уязвимость компонента cache браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01519
Уязвимость программы 3D рендера SwiftShader браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01520
Уязвимость расширений браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01521
Уязвимость функции печати браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01522
Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01523
Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01524
Уязвимость компонента SerialPort браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01567
Уязвимость браузера Google Chrome, существующая из-за считывания данных за пределами заданного буфера, позволяющая нарушителю скомпрометировать процесс рендеринга и раскрыть защищаемую информацию
BDU:2021-01645
Уязвимость функции blink::FileReaderLoader::OnReceivedData браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01647
Уязвимость расширения браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01648
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01675
Уязвимость функции MediaStreamCaptureIndicator::WebContentsDeviceUsage::AddDevices() браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01704
Уязвимость функции OffscreenCanvas браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01705
Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01706
Уязвимость стандарта передачи данных WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01707
Уязвимость компонента WebUSB браузера Google Chrome, связанная с целочисленным переполнением значения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01708
Уязвимость компонента media браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01709
Уязвимость компонента «Разрешения» браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01710
Уязвимость компонента Content Security Policy браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01711
Уязвимость функции Автозаполнения браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01712
Уязвимость компонента presentation API браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01713
Уязвимость компонента SwiftShader браузера Google Chrome, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01714
Уязвимость расширений браузера Google Chrome, связанная с использованием области памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01715
Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01755
Уязвимость библиотеки передачи сообщений Mojo браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01756
Уязвимость модуля отображения Blink браузера Google Chrome, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03536
Уязвимость программных средств Google Chrome, Firefox, Firefox ESR, Thunderbird, связанная с ошибкой подтверждения источника данных, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-03537
Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-06059
Уязвимость компонента video браузера Google Chrome, позволяющая нарушителю выйти из изолированной программной среды
BDU:2021-06061
Уязвимость пользовательского интерфейса WebUI браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2021-06062
Уязвимость компонента NFC браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю выйти из изолированной программной среды
BDU:2021-06064
Уязвимость компонента Payments браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2021-06065
Уязвимость реализации диалоговых окон браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-06066
Уязвимость API для доступа к устройствам виртуальной реальности WebVR браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2021-06067
Уязвимость компонента Audio браузера Google Chrome, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-06068
Уязвимость функции Downloads веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06071
Уязвимость компонента Media браузера Google Chrome, вызванная целочисленным переполнением, позволяющая нарушителю вызвать переполнение буфера с помощью специально созданной HTML страницы
BDU:2021-06072
Уязвимость функции Intents браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2021-06073
Уязвимость функции Navigation браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения
BDU:2021-06076
Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданного URL
BDU:2021-06077
Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2024-11-21
CVE-2019-8075
Adobe Flash Player version 32.0.0.192 and earlier versions have a Same Origin Policy Bypass vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
- https://crbug.com/945997
- https://helpx.adobe.com/security/products/flash-player/apsb19-30.html
- FEDORA-2020-10ec8aca61
- FEDORA-2020-3e005ce2e0
- DSA-4824
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
- DSA-4824
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-10ec8aca61
- https://helpx.adobe.com/security/products/flash-player/apsb19-30.html
- https://crbug.com/945997
Modified: 2024-11-21
CVE-2020-15959
Insufficient policy enforcement in networking in Google Chrome prior to 85.0.4183.102 allowed an attacker who convinced the user to enable logging to obtain potentially sensitive information from process memory via social engineering.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1122684
- https://crbug.com/1122684
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15960
Heap buffer overflow in storage in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1100136
- https://crbug.com/1100136
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15961
Insufficient policy validation in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1114636
- https://crbug.com/1114636
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15962
Insufficient policy validation in serial in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1121836
- https://crbug.com/1121836
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15963
Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1113558
- https://crbug.com/1113558
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15964
Insufficient data validation in media in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1121414
- https://crbug.com/1121414
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15965
Type confusion in V8 in Google Chrome prior to 85.0.4183.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1126249
- https://crbug.com/1126249
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15966
Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1527
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1542
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1550
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1113565
- https://crbug.com/1113565
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- FEDORA-2020-214865ce21
- FEDORA-2020-214865ce21
- GLSA-202009-13
- GLSA-202009-13
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15967
Use after free in payments in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1127322
- https://crbug.com/1127322
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15968
Use after free in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1126424
- https://crbug.com/1126424
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15969
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- 20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3
- 20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3
- 20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave
- 20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave
- 20201215 APPLE-SA-2020-12-14-5 watchOS 7.2
- 20201215 APPLE-SA-2020-12-14-5 watchOS 7.2
- 20201215 APPLE-SA-2020-12-14-7 tvOS 14.3
- 20201215 APPLE-SA-2020-12-14-7 tvOS 14.3
- 20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2
- 20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1124659
- https://crbug.com/1124659
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- https://support.apple.com/kb/HT212003
- https://support.apple.com/kb/HT212003
- https://support.apple.com/kb/HT212005
- https://support.apple.com/kb/HT212005
- https://support.apple.com/kb/HT212007
- https://support.apple.com/kb/HT212007
- https://support.apple.com/kb/HT212009
- https://support.apple.com/kb/HT212009
- https://support.apple.com/kb/HT212011
- https://support.apple.com/kb/HT212011
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15970
Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1108299
- https://crbug.com/1108299
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15971
Use after free in printing in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1114062
- https://crbug.com/1114062
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15972
Use after free in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/172842/Chrome-Renderer-Remote-Code-Execution.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1115901
- https://crbug.com/1115901
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15973
Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1106890
- https://crbug.com/1106890
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15974
Integer overflow in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1104103
- https://crbug.com/1104103
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15975
Integer overflow in SwiftShader in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1110800
- https://crbug.com/1110800
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15976
Use after free in WebXR in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1123522
- https://crbug.com/1123522
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15977
Insufficient data validation in dialogs in Google Chrome on OS X prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1097724
- https://crbug.com/1097724
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15978
Insufficient data validation in navigation in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1116280
- https://crbug.com/1116280
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15979
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1127319
- https://crbug.com/1127319
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15980
Insufficient policy enforcement in Intents in Google Chrome on Android prior to 86.0.4240.75 allowed a local attacker to bypass navigation restrictions via crafted Intents.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1092453
- https://crbug.com/1092453
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15981
Out of bounds read in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1123023
- https://crbug.com/1123023
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15982
Inappropriate implementation in cache in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1039882
- https://crbug.com/1039882
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15983
Insufficient data validation in webUI in Google Chrome on ChromeOS prior to 86.0.4240.75 allowed a local attacker to bypass content security policy via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1076786
- https://crbug.com/1076786
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15984
Insufficient policy enforcement in Omnibox in Google Chrome on iOS prior to 86.0.4240.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted URL.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1080395
- https://crbug.com/1080395
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15985
Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to spoof security UI via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1099276
- https://crbug.com/1099276
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15986
Integer overflow in media in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1100247
- https://crbug.com/1100247
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15987
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1127774
- https://crbug.com/1127774
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15988
Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1092518
- https://crbug.com/1092518
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15989
Uninitialized data in PDFium in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1108351
- https://crbug.com/1108351
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15990
Use after free in autofill in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1133671
- https://crbug.com/1133671
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15991
Use after free in password manager in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1133688
- https://crbug.com/1133688
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15992
Insufficient policy enforcement in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1110195
- https://crbug.com/1110195
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-15995
Out of bounds write in V8 in Google Chrome prior to 86.0.4240.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/10/chrome-for-android-update_31.html
- https://chromereleases.googleblog.com/2020/10/chrome-for-android-update_31.html
- https://crbug.com/1132111
- https://crbug.com/1132111
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2025-02-05
CVE-2020-15999
Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- 20201118 TCMalloc viewer/dumper - TCMalloc Inspector Tool
- 20201118 TCMalloc viewer/dumper - TCMalloc Inspector Tool
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://crbug.com/1139963
- https://crbug.com/1139963
- https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
- https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
- FEDORA-2020-6b35849edd
- FEDORA-2020-6b35849edd
- GLSA-202011-12
- GLSA-202011-12
- GLSA-202012-04
- GLSA-202012-04
- GLSA-202401-19
- GLSA-202401-19
- https://security.netapp.com/advisory/ntap-20240812-0001/
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16000
Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://crbug.com/1125337
- https://crbug.com/1125337
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16001
Use after free in media in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://crbug.com/1135018
- https://crbug.com/1135018
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16002
Use after free in PDFium in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://crbug.com/1137630
- https://crbug.com/1137630
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16003
Use after free in printing in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
- https://crbug.com/1134960
- https://crbug.com/1134960
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16004
Use after free in user interface in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1831
- openSUSE-SU-2020:1831
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://crbug.com/1138911
- https://crbug.com/1138911
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202011-12
- GLSA-202011-12
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16005
Insufficient policy enforcement in ANGLE in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1831
- openSUSE-SU-2020:1831
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://crbug.com/1139398
- https://crbug.com/1139398
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202011-12
- GLSA-202011-12
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16006
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1831
- openSUSE-SU-2020:1831
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://crbug.com/1133527
- https://crbug.com/1133527
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202011-12
- GLSA-202011-12
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16007
Insufficient data validation in installer in Google Chrome prior to 86.0.4240.183 allowed a local attacker to potentially elevate privilege via a crafted filesystem.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1831
- openSUSE-SU-2020:1831
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://crbug.com/1125018
- https://crbug.com/1125018
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16008
Stack buffer overflow in WebRTC in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit stack corruption via a crafted WebRTC packet.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1831
- openSUSE-SU-2020:1831
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://crbug.com/1134107
- https://crbug.com/1134107
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202011-12
- GLSA-202011-12
- DSA-4824
- DSA-4824
Modified: 2025-02-05
CVE-2020-16009
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1831
- openSUSE-SU-2020:1831
- http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html
- http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://crbug.com/1143772
- https://crbug.com/1143772
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-3e005ce2e0
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202011-12
- GLSA-202011-12
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-16012
Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Modified: 2025-02-05
CVE-2020-16013
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16014
Use after free in PPAPI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16015
Insufficient data validation in WASM in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16016
Inappropriate implementation in base in Google Chrome prior to 86.0.4240.193 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Modified: 2025-02-05
CVE-2020-16017
Use after free in site isolation in Google Chrome prior to 86.0.4240.198 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16018
Use after free in payments in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16019
Inappropriate implementation in filesystem in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass noexec restrictions via a malicious file.
Modified: 2024-11-21
CVE-2020-16020
Inappropriate implementation in cryptohome in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass discretionary access control via a malicious file.
Modified: 2024-11-21
CVE-2020-16021
Race in image burner in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to perform OS-level privilege escalation via a malicious file.
Modified: 2024-11-21
CVE-2020-16022
Insufficient policy enforcement in networking in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially bypass firewall controls via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16023
Use after free in WebCodecs in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16024
Heap buffer overflow in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- http://packetstormsecurity.com/files/161353/Chrome-SkBitmapOperations-UnPreMultiply-Heap-Buffer-Overflow.html
- http://packetstormsecurity.com/files/161353/Chrome-SkBitmapOperations-UnPreMultiply-Heap-Buffer-Overflow.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
- https://crbug.com/1147430
- https://crbug.com/1147430
Modified: 2024-11-21
CVE-2020-16025
Heap buffer overflow in clipboard in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- http://packetstormsecurity.com/files/161354/Chrome-ClipboardWin-WriteBitmap-Heap-Buffer-Overflow.html
- http://packetstormsecurity.com/files/161354/Chrome-ClipboardWin-WriteBitmap-Heap-Buffer-Overflow.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_17.html
- https://crbug.com/1147431
- https://crbug.com/1147431
Modified: 2024-11-21
CVE-2020-16026
Use after free in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16027
Insufficient policy enforcement in developer tools in Google Chrome prior to 87.0.4280.66 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from the user's disk via a crafted Chrome Extension.
Modified: 2024-11-21
CVE-2020-16028
Heap buffer overflow in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16029
Inappropriate implementation in PDFium in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to bypass navigation restrictions via a crafted PDF file.
Modified: 2024-11-21
CVE-2020-16030
Insufficient data validation in Blink in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16031
Insufficient data validation in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16032
Insufficient data validation in sharing in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16033
Inappropriate implementation in WebUSB in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to spoof security UI via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16034
Inappropriate implementation in WebRTC in Google Chrome prior to 87.0.4280.66 allowed a local attacker to bypass policy restrictions via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16035
Insufficient data validation in cros-disks in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised the browser process to bypass noexec restrictions via a malicious file.
Modified: 2024-11-21
CVE-2020-16036
Inappropriate implementation in cookies in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to bypass cookie restrictions via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16037
Use after free in clipboard in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16038
Use after free in media in Google Chrome on OS X prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16039
Use after free in extensions in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16040
Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/162087/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162087/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162106/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162106/Google-Chrome-86.0.4240-V8-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162144/Google-Chrome-SimplfiedLowering-Integer-Overflow.html
- http://packetstormsecurity.com/files/162144/Google-Chrome-SimplfiedLowering-Integer-Overflow.html
- https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html
- https://crbug.com/1150649
- https://crbug.com/1150649
Modified: 2024-11-21
CVE-2020-16041
Out of bounds read in networking in Google Chrome prior to 87.0.4280.88 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page.
- http://packetstormsecurity.com/files/161581/Chrome-DataElement-Out-Of-Bounds-Read.html
- http://packetstormsecurity.com/files/161581/Chrome-DataElement-Out-Of-Bounds-Read.html
- https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html
- https://crbug.com/1151865
- https://crbug.com/1151865
Modified: 2024-11-21
CVE-2020-16042
Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-16043
Insufficient data validation in networking in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to bypass discretionary access control via malicious network traffic.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1148309
- https://crbug.com/1148309
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2020-6542
Use after free in ANGLE in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1107433
- https://crbug.com/1107433
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1127
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1127
Modified: 2024-11-21
CVE-2020-6543
Use after free in task scheduling in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1104046
- https://crbug.com/1104046
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6544
Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1108497
- https://crbug.com/1108497
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6545
Use after free in audio in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1095584
- https://crbug.com/1095584
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6546
Inappropriate implementation in installer in Google Chrome prior to 84.0.4147.125 allowed a local attacker to potentially elevate privilege via a crafted filesystem.
Modified: 2024-11-21
CVE-2020-6547
Incorrect security UI in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially obtain sensitive information via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-6548
Heap buffer overflow in Skia in Google Chrome prior to 84.0.4147.125 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1103827
- https://crbug.com/1103827
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6549
Use after free in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/159558/Chrome-MediaElementEventListener-UpdateSources-Use-After-Free.html
- http://packetstormsecurity.com/files/159558/Chrome-MediaElementEventListener-UpdateSources-Use-After-Free.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1105426
- https://crbug.com/1105426
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6550
Use after free in IndexedDB in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/159609/Chrome-WebIDBGetDBNamesCallbacksImpl-SuccessNamesAndVersionsList-Use-After-Free.html
- http://packetstormsecurity.com/files/159609/Chrome-WebIDBGetDBNamesCallbacksImpl-SuccessNamesAndVersionsList-Use-After-Free.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1106682
- https://crbug.com/1106682
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6551
Use after free in WebXR in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/159611/Chrome-XRSystem-FocusedFrameChanged-and-FocusController-NotifyFocusChangedObservers-Use-After-Free.html
- http://packetstormsecurity.com/files/159611/Chrome-XRSystem-FocusedFrameChanged-and-FocusController-NotifyFocusChangedObservers-Use-After-Free.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1107815
- https://crbug.com/1107815
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6552
Use after free in Blink in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-6554
Use after free in extensions in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.
Modified: 2024-11-21
CVE-2020-6555
Out of bounds read in WebGL in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html
- https://crbug.com/1105202
- https://crbug.com/1105202
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1123
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1123
Modified: 2024-11-21
CVE-2020-6556
Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html
- https://crbug.com/1115345
- https://crbug.com/1115345
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6557
Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1083278
- https://crbug.com/1083278
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6559
Use after free in presentation API in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://crbug.com/1116706
- https://crbug.com/1116706
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6560
Insufficient policy enforcement in autofill in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://crbug.com/1108181
- https://crbug.com/1108181
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6561
Inappropriate implementation in Content Security Policy in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://crbug.com/932892
- https://crbug.com/932892
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6562
Insufficient policy enforcement in Blink in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://crbug.com/1086845
- https://crbug.com/1086845
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6564
Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://crbug.com/841622
- https://crbug.com/841622
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6566
Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://crbug.com/1065264
- https://crbug.com/1065264
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6569
Integer overflow in WebUSB in Google Chrome prior to 85.0.4183.83 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://crbug.com/995732
- https://crbug.com/995732
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6570
Information leakage in WebRTC in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to obtain potentially sensitive information via a crafted WebRTC interaction.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://crbug.com/1084699
- https://crbug.com/1084699
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6571
Insufficient data validation in Omnibox in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html
- https://crbug.com/1085315
- https://crbug.com/1085315
- FEDORA-2020-6da740d38c
- FEDORA-2020-6da740d38c
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6573
Use after free in video in Google Chrome on Android prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1116304
- https://crbug.com/1116304
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6575
Race in Mojo in Google Chrome prior to 85.0.4183.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1081874
- https://crbug.com/1081874
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2020-6576
Use after free in offscreen canvas in Google Chrome prior to 85.0.4183.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1499
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1510
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1514
- openSUSE-SU-2020:1713
- openSUSE-SU-2020:1713
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html
- https://crbug.com/1111737
- https://crbug.com/1111737
- FEDORA-2020-aea86f913e
- FEDORA-2020-aea86f913e
- FEDORA-2020-2d994b986d
- FEDORA-2020-2d994b986d
- GLSA-202101-30
- GLSA-202101-30
- DSA-4824
- DSA-4824
Modified: 2024-11-21
CVE-2021-21106
Use after free in autofill in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1148749
- https://crbug.com/1148749
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21107
Use after free in drag and drop in Google Chrome on Linux prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1153595
- https://crbug.com/1153595
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21108
Use after free in media in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1155426
- https://crbug.com/1155426
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21109
Use after free in payments in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1152334
- https://crbug.com/1152334
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21110
Use after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1152451
- https://crbug.com/1152451
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21111
Insufficient policy enforcement in WebUI in Google Chrome prior to 87.0.4280.141 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1149125
- https://crbug.com/1149125
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21112
Use after free in Blink in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1151298
- https://crbug.com/1151298
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21113
Heap buffer overflow in Skia in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1155178
- https://crbug.com/1155178
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21114
Use after free in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1150065
- https://crbug.com/1150065
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21115
User after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1157814
- https://crbug.com/1157814
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832
Modified: 2024-11-21
CVE-2021-21116
Heap buffer overflow in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop.html
- https://crbug.com/1151069
- https://crbug.com/1151069
- FEDORA-2021-79926272ce
- FEDORA-2021-79926272ce
- FEDORA-2021-d9faeff8eb
- FEDORA-2021-d9faeff8eb
- GLSA-202101-05
- GLSA-202101-05
- DSA-4832
- DSA-4832