ALT-PU-2020-1962-1
Closed vulnerabilities
BDU:2020-03744
Уязвимость модуля PDFium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03745
Уязвимость механизма онлайн оплаты браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03746
Уязвимость механизма форматирования URL-адресов браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-03747
Уязвимость хранилища браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03748
Уязвимость планировщика заданий браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03749
Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03849
Уязвимость механизма проверки фрагментов SCTP в WebRTC веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-6458
Out of bounds read and write in PDFium in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
- https://crbug.com/1067270
- https://www.debian.org/security/2020/dsa-4714
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1044
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
- https://crbug.com/1067270
- https://www.debian.org/security/2020/dsa-4714
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1044
Modified: 2024-11-21
CVE-2020-6459
Use after free in payments in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
- https://crbug.com/1065298
- https://www.debian.org/security/2020/dsa-4714
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
- https://crbug.com/1065298
- https://www.debian.org/security/2020/dsa-4714
Modified: 2024-11-21
CVE-2020-6460
Insufficient data validation in URL formatting in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to perform domain spoofing via a crafted domain name.
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
- https://crbug.com/1063566
- https://www.debian.org/security/2020/dsa-4714
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
- https://crbug.com/1063566
- https://www.debian.org/security/2020/dsa-4714
Modified: 2024-11-21
CVE-2020-6461
Use after free in storage in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_27.html
- https://crbug.com/1072983
- https://security.gentoo.org/glsa/202005-13
- https://www.debian.org/security/2020/dsa-4714
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_27.html
- https://crbug.com/1072983
- https://security.gentoo.org/glsa/202005-13
- https://www.debian.org/security/2020/dsa-4714
Modified: 2024-11-21
CVE-2020-6462
Use after free in task scheduling in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_27.html
- https://crbug.com/1064891
- https://security.gentoo.org/glsa/202005-13
- https://www.debian.org/security/2020/dsa-4714
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_27.html
- https://crbug.com/1064891
- https://security.gentoo.org/glsa/202005-13
- https://www.debian.org/security/2020/dsa-4714
Modified: 2024-11-21
CVE-2020-6463
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
- https://crbug.com/1065186
- https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/
- https://security.gentoo.org/glsa/202007-60
- https://security.gentoo.org/glsa/202007-64
- https://usn.ubuntu.com/4443-1/
- https://www.debian.org/security/2020/dsa-4714
- https://www.debian.org/security/2020/dsa-4736
- https://www.debian.org/security/2020/dsa-4740
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html
- https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_21.html
- https://crbug.com/1065186
- https://lists.debian.org/debian-lts-announce/2020/07/msg00027.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQYH5OK7O4BU6E37WWG5SEEHV65BFSGR/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLFZ5N4EK6I4ZJP5YSKLLVN3ELXEB4XT/
- https://security.gentoo.org/glsa/202007-60
- https://security.gentoo.org/glsa/202007-64
- https://usn.ubuntu.com/4443-1/
- https://www.debian.org/security/2020/dsa-4714
- https://www.debian.org/security/2020/dsa-4736
- https://www.debian.org/security/2020/dsa-4740
Modified: 2024-11-21
CVE-2020-6464
Type confusion in Blink in Google Chrome prior to 81.0.4044.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html
- https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop.html
- https://crbug.com/1071059
- https://security.gentoo.org/glsa/202005-13
- https://www.debian.org/security/2020/dsa-4714
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html
- https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop.html
- https://crbug.com/1071059
- https://security.gentoo.org/glsa/202005-13
- https://www.debian.org/security/2020/dsa-4714
Modified: 2024-11-21
CVE-2020-6831
A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html
- http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1632241
- https://security.gentoo.org/glsa/202005-03
- https://security.gentoo.org/glsa/202005-04
- https://usn.ubuntu.com/4373-1/
- https://www.debian.org/security/2020/dsa-4714
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html
- http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1632241
- https://security.gentoo.org/glsa/202005-03
- https://security.gentoo.org/glsa/202005-04
- https://usn.ubuntu.com/4373-1/
- https://www.debian.org/security/2020/dsa-4714
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-18/