ALT-PU-2020-3120-1
Closed vulnerabilities
BDU:2020-05387
Уязвимость библиотеки crossbeam-channel набора инструментов для параллельного программирования Crossbeam, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01486
Уязвимость реализации технологии WebRTC программных средств Google Chrome, Firefox, Firefox-ESR и Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05797
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-05805
Уязвимость браузера Mozilla Firefox, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-05930
Уязвимость браузера Mozilla Firefox, связанная с ошибками управления ресурсом, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05932
Уязвимость браузера Mozilla Firefox, связанная с недостатком в механизме подтверждения источника данных, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2024-11-21
CVE-2020-15254
Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements. This has been fixed in crossbeam-channel 0.4.4.
- https://github.com/crossbeam-rs/crossbeam/issues/539
- https://github.com/crossbeam-rs/crossbeam/issues/539
- https://github.com/crossbeam-rs/crossbeam/pull/533
- https://github.com/crossbeam-rs/crossbeam/pull/533
- https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
- https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
- https://github.com/RustSec/advisory-db/pull/425
- https://github.com/RustSec/advisory-db/pull/425
Modified: 2024-11-21
CVE-2020-15680
If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82.
Modified: 2024-11-21
CVE-2020-15681
When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 82.
Modified: 2024-11-21
CVE-2020-15682
When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing attack. This was fixed by changing external protocol prompts to be tab-modal while also ensuring they could not be incorrectly associated with a different origin. This vulnerability affects Firefox < 82.
Modified: 2024-11-21
CVE-2020-15683
Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.4, Firefox < 82, and Thunderbird < 78.4.
- openSUSE-SU-2020:1732
- openSUSE-SU-2020:1732
- openSUSE-SU-2020:1748
- openSUSE-SU-2020:1748
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1785
- openSUSE-SU-2020:1785
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140
- [debian-lts-announce] 20201027 [SECURITY] [DLA 2416-1] thunderbird security update
- [debian-lts-announce] 20201027 [SECURITY] [DLA 2416-1] thunderbird security update
- GLSA-202010-08
- GLSA-202010-08
- DSA-4780
- DSA-4780
- https://www.mozilla.org/security/advisories/mfsa2020-45/
- https://www.mozilla.org/security/advisories/mfsa2020-45/
- https://www.mozilla.org/security/advisories/mfsa2020-46/
- https://www.mozilla.org/security/advisories/mfsa2020-46/
- https://www.mozilla.org/security/advisories/mfsa2020-47/
- https://www.mozilla.org/security/advisories/mfsa2020-47/
Modified: 2024-11-21
CVE-2020-15684
Mozilla developers reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 82.
Modified: 2024-11-21
CVE-2020-15969
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- 20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3
- 20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3
- 20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave
- 20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave
- 20201215 APPLE-SA-2020-12-14-5 watchOS 7.2
- 20201215 APPLE-SA-2020-12-14-5 watchOS 7.2
- 20201215 APPLE-SA-2020-12-14-7 tvOS 14.3
- 20201215 APPLE-SA-2020-12-14-7 tvOS 14.3
- 20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2
- 20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1124659
- https://crbug.com/1124659
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- https://support.apple.com/kb/HT212003
- https://support.apple.com/kb/HT212003
- https://support.apple.com/kb/HT212005
- https://support.apple.com/kb/HT212005
- https://support.apple.com/kb/HT212007
- https://support.apple.com/kb/HT212007
- https://support.apple.com/kb/HT212009
- https://support.apple.com/kb/HT212009
- https://support.apple.com/kb/HT212011
- https://support.apple.com/kb/HT212011
- DSA-4824
- DSA-4824