Action not permitted
Modal body text goes here.
CVE-2020-15969
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:30:23.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://crbug.com/1124659" }, { "name": "openSUSE-SU-2020:1829", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "name": "FEDORA-2020-127d40f1ab", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" }, { "name": "FEDORA-2020-8aca25b5c8", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/" }, { "name": "FEDORA-2020-4e8e48da22", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212009" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212011" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212005" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212003" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212007" }, { "name": "20201215 APPLE-SA-2020-12-14-5 watchOS 7.2", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/27" }, { "name": "20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/30" }, { "name": "20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/24" }, { "name": "20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/26" }, { "name": "20201215 APPLE-SA-2020-12-14-7 tvOS 14.3", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/29" }, { "name": "DSA-4824", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4824" }, { "name": "GLSA-202101-30", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202101-30" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Chrome", "vendor": "Google", "versions": [ { "lessThan": "86.0.4240.75", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ], "problemTypes": [ { "descriptions": [ { "description": "Use after free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-26T02:07:24", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://crbug.com/1124659" }, { "name": "openSUSE-SU-2020:1829", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "name": "FEDORA-2020-127d40f1ab", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" }, { "name": "FEDORA-2020-8aca25b5c8", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/" }, { "name": "FEDORA-2020-4e8e48da22", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212009" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212011" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212005" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212003" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212007" }, { "name": "20201215 APPLE-SA-2020-12-14-5 watchOS 7.2", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/27" }, { "name": "20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/30" }, { "name": "20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/24" }, { "name": "20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/26" }, { "name": "20201215 APPLE-SA-2020-12-14-7 tvOS 14.3", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/29" }, { "name": "DSA-4824", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4824" }, { "name": "GLSA-202101-30", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202101-30" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "chrome-cve-admin@google.com", "ID": "CVE-2020-15969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "86.0.4240.75" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "refsource": "MISC", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" }, { "name": "https://crbug.com/1124659", "refsource": "MISC", "url": "https://crbug.com/1124659" }, { "name": "openSUSE-SU-2020:1829", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "name": "FEDORA-2020-127d40f1ab", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" }, { "name": "FEDORA-2020-8aca25b5c8", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/" }, { "name": "FEDORA-2020-4e8e48da22", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/" }, { "name": "https://support.apple.com/kb/HT212009", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212009" }, { "name": "https://support.apple.com/kb/HT212011", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212011" }, { "name": "https://support.apple.com/kb/HT212005", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212005" }, { "name": "https://support.apple.com/kb/HT212003", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212003" }, { "name": "https://support.apple.com/kb/HT212007", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212007" }, { "name": "20201215 APPLE-SA-2020-12-14-5 watchOS 7.2", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/27" }, { "name": "20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/30" }, { "name": "20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/24" }, { "name": "20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/26" }, { "name": "20201215 APPLE-SA-2020-12-14-7 tvOS 14.3", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/29" }, { "name": "DSA-4824", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4824" }, { "name": "GLSA-202101-30", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-30" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2020-15969", "datePublished": "2020-11-03T02:21:27", "dateReserved": "2020-07-27T00:00:00", "dateUpdated": "2024-08-04T13:30:23.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-15969\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2020-11-03T03:15:12.790\",\"lastModified\":\"2023-11-07T03:17:58.410\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Un uso de la memoria previamente liberada en WebRTC en Google Chrome anterior a versi\u00f3n 86.0.4240.75, permit\u00eda a un atacante remoto explotar potencialmente una corrupci\u00f3n de la pila por medio de una p\u00e1gina HTML dise\u00f1ada\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"86.0.4240.75\",\"matchCriteriaId\":\"92B391C8-0D51-4BBE-AA06-25E534ED49DD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E82302-4B77-44F3-97B1-24C18AC4A35D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0.2\",\"matchCriteriaId\":\"E743245B-52BC-40A6-B4EF-09BE2C606FC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.3\",\"matchCriteriaId\":\"0D8BA3D3-D515-4592-9805-E7B3C17343AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.3\",\"matchCriteriaId\":\"8B16DB0D-3DD4-492A-9D99-670C7B6136EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.1\",\"matchCriteriaId\":\"34BD2DC9-459A-46A3-82C8-ECA892F3B3D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.3\",\"matchCriteriaId\":\"24E35E29-5575-4EEB-B8A6-D333149E4B3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.2\",\"matchCriteriaId\":\"EBB77299-35F0-4730-9853-D939C77E3FBE\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Dec/24\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Dec/26\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Dec/27\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Dec/29\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Dec/30\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1124659\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://security.gentoo.org/glsa/202101-30\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212003\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212005\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212007\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212009\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212011\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4824\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2020_4944
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for thunderbird is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.4.0.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4944", "url": "https://access.redhat.com/errata/RHSA-2020:4944" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4944.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T15:52:17+00:00", "generator": { "date": "2024-11-22T15:52:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4944", "initial_release_date": "2020-11-05T08:58:00+00:00", "revision_history": [ { "date": "2020-11-05T08:58:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-05T08:58:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:52:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_0.x86_64", "product": { "name": "thunderbird-0:78.4.0-1.el8_0.x86_64", "product_id": "thunderbird-0:78.4.0-1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_0.ppc64le", "product": { "name": "thunderbird-0:78.4.0-1.el8_0.ppc64le", "product_id": "thunderbird-0:78.4.0-1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_0.src", "product": { "name": "thunderbird-0:78.4.0-1.el8_0.src", "product_id": "thunderbird-0:78.4.0-1.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.ppc64le" }, "product_reference": "thunderbird-0:78.4.0-1.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.src" }, "product_reference": "thunderbird-0:78.4.0-1.el8_0.src", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-05T08:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4944" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-05T08:58:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4944" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:thunderbird-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:thunderbird-debugsource-0:78.4.0-1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4947
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for thunderbird is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.4.0.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4947", "url": "https://access.redhat.com/errata/RHSA-2020:4947" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4947.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T15:52:24+00:00", "generator": { "date": "2024-11-22T15:52:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4947", "initial_release_date": "2020-11-05T09:36:39+00:00", "revision_history": [ { "date": "2020-11-05T09:36:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-05T09:36:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:52:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el6_10.i686", "product": { "name": "thunderbird-0:78.4.0-1.el6_10.i686", "product_id": "thunderbird-0:78.4.0-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el6_10.x86_64", "product": { "name": "thunderbird-0:78.4.0-1.el6_10.x86_64", "product_id": "thunderbird-0:78.4.0-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el6_10.src", "product": { "name": "thunderbird-0:78.4.0-1.el6_10.src", "product_id": "thunderbird-0:78.4.0-1.el6_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el6_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el6_10.ppc64", "product": { "name": "thunderbird-0:78.4.0-1.el6_10.ppc64", "product_id": "thunderbird-0:78.4.0-1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el6_10?arch=ppc64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el6_10?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el6_10.s390x", "product": { "name": "thunderbird-0:78.4.0-1.el6_10.s390x", "product_id": "thunderbird-0:78.4.0-1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el6_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.src" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.src", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.src" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.src", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.src" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.src", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-05T09:36:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-05T09:36:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Client-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Client-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Server-optional-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Server-optional-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.i686", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.src", "6Workstation-6.10.z:thunderbird-0:78.4.0-1.el6_10.x86_64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.ppc64", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.s390x", "6Workstation-6.10.z:thunderbird-debuginfo-0:78.4.0-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4317
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for firefox is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 78.4.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4317", "url": "https://access.redhat.com/errata/RHSA-2020:4317" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4317.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T15:51:31+00:00", "generator": { "date": "2024-11-22T15:51:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4317", "initial_release_date": "2020-10-22T20:56:02+00:00", "revision_history": [ { "date": "2020-10-22T20:56:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-22T20:56:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:51:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_2.s390x", "product": { "name": "firefox-0:78.4.0-1.el8_2.s390x", "product_id": "firefox-0:78.4.0-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_2.s390x", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_2.s390x", "product_id": "firefox-debugsource-0:78.4.0-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_2.x86_64", "product": { "name": "firefox-0:78.4.0-1.el8_2.x86_64", "product_id": "firefox-0:78.4.0-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_2.x86_64", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_2.x86_64", "product_id": "firefox-debugsource-0:78.4.0-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_2.ppc64le", "product": { "name": "firefox-0:78.4.0-1.el8_2.ppc64le", "product_id": "firefox-0:78.4.0-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "product_id": "firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_2.aarch64", "product": { "name": "firefox-0:78.4.0-1.el8_2.aarch64", "product_id": "firefox-0:78.4.0-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "product_id": "firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_2.src", "product": { "name": "firefox-0:78.4.0-1.el8_2.src", "product_id": "firefox-0:78.4.0-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.aarch64" }, "product_reference": "firefox-0:78.4.0-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.ppc64le" }, "product_reference": "firefox-0:78.4.0-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.s390x" }, "product_reference": "firefox-0:78.4.0-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.src" }, "product_reference": "firefox-0:78.4.0-1.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.x86_64" }, "product_reference": "firefox-0:78.4.0-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.aarch64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.aarch64" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.ppc64le" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.s390x" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.x86_64" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-22T20:56:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4317" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-22T20:56:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4317" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.MAIN.EUS:firefox-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.s390x", "AppStream-8.2.0.Z.MAIN.EUS:firefox-debugsource-0:78.4.0-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4235
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nThis update upgrades Chromium to version 86.0.4240.75.\n\nSecurity Fix(es):\n\n* chromium-browser: Use after free in payments (CVE-2020-15967)\n\n* chromium-browser: Use after free in Blink (CVE-2020-15968)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\n* chromium-browser: Use after free in NFC (CVE-2020-15970)\n\n* chromium-browser: Use after free in printing (CVE-2020-15971)\n\n* chromium-browser: Use after free in audio (CVE-2020-15972)\n\n* chromium-browser: Use after free in autofill (CVE-2020-15990)\n\n* chromium-browser: Use after free in password manager (CVE-2020-15991)\n\n* chromium-browser: Inappropriate implementation in networking (CVE-2020-6557)\n\n* chromium-browser: Insufficient policy enforcement in extensions (CVE-2020-15973)\n\n* chromium-browser: Integer overflow in Blink (CVE-2020-15974)\n\n* chromium-browser: Integer overflow in SwiftShader (CVE-2020-15975)\n\n* chromium-browser: Use after free in WebXR (CVE-2020-15976)\n\n* chromium-browser: Insufficient data validation in dialogs (CVE-2020-15977)\n\n* chromium-browser: Insufficient data validation in navigation (CVE-2020-15978)\n\n* chromium-browser: Inappropriate implementation in V8 (CVE-2020-15979)\n\n* chromium-browser: Insufficient policy enforcement in Intents (CVE-2020-15980)\n\n* chromium-browser: Out of bounds read in audio (CVE-2020-15981)\n\n* chromium-browser: Side-channel information leakage in cache (CVE-2020-15982)\n\n* chromium-browser: Insufficient data validation in webUI (CVE-2020-15983)\n\n* chromium-browser: Insufficient policy enforcement in Omnibox (CVE-2020-15984)\n\n* chromium-browser: Inappropriate implementation in Blink (CVE-2020-15985)\n\n* chromium-browser: Integer overflow in media (CVE-2020-15986)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15987)\n\n* chromium-browser: Insufficient policy enforcement in networking (CVE-2020-15992)\n\n* chromium-browser: Insufficient policy enforcement in downloads (CVE-2020-15988)\n\n* chromium-browser: Uninitialized use in PDFium (CVE-2020-15989)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4235", "url": "https://access.redhat.com/errata/RHSA-2020:4235" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1885883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885883" }, { "category": "external", "summary": "1885884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885884" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1885886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885886" }, { "category": "external", "summary": "1885887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885887" }, { "category": "external", "summary": "1885888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885888" }, { "category": "external", "summary": "1885889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885889" }, { "category": "external", "summary": "1885890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885890" }, { "category": "external", "summary": "1885891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885891" }, { "category": "external", "summary": "1885892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885892" }, { "category": "external", "summary": "1885893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885893" }, { "category": "external", "summary": "1885894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885894" }, { "category": "external", "summary": "1885896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885896" }, { "category": "external", "summary": "1885897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885897" }, { "category": "external", "summary": "1885899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885899" }, { "category": "external", "summary": "1885901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885901" }, { "category": "external", "summary": "1885902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885902" }, { "category": "external", "summary": "1885903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885903" }, { "category": "external", "summary": "1885904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885904" }, { "category": "external", "summary": "1885905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885905" }, { "category": "external", "summary": "1885906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885906" }, { "category": "external", "summary": "1885907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885907" }, { "category": "external", "summary": "1885908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885908" }, { "category": "external", "summary": "1885909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885909" }, { "category": "external", "summary": "1885910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885910" }, { "category": "external", "summary": "1885911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885911" }, { "category": "external", "summary": "1885912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885912" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4235.json" } ], "title": "Red Hat Security Advisory: chromium-browser security update", "tracking": { "current_release_date": "2024-11-15T09:37:30+00:00", "generator": { "date": "2024-11-15T09:37:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4235", "initial_release_date": "2020-10-13T08:22:05+00:00", "revision_history": [ { "date": "2020-10-13T08:22:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-13T08:22:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T09:37:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:86.0.4240.75-1.el6_10.i686", "product": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.i686", "product_id": "chromium-browser-0:86.0.4240.75-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@86.0.4240.75-1.el6_10?arch=i686" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "product": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "product_id": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@86.0.4240.75-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "product": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "product_id": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser@86.0.4240.75-1.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "product": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "product_id": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/chromium-browser-debuginfo@86.0.4240.75-1.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686" }, "product_reference": "chromium-browser-0:86.0.4240.75-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686" }, "product_reference": "chromium-browser-0:86.0.4240.75-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686" }, "product_reference": "chromium-browser-0:86.0.4240.75-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686" }, "product_reference": "chromium-browser-0:86.0.4240.75-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64" }, "product_reference": "chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686" }, "product_reference": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" }, "product_reference": "chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-6557", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885896" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in networking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-6557" }, { "category": "external", "summary": "RHBZ#1885896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-6557", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-6557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6557" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in networking" }, { "cve": "CVE-2020-15967", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885883" } ], "notes": [ { "category": "description", "text": "Use after free in payments in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in payments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15967" }, { "category": "external", "summary": "RHBZ#1885883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15967", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15967" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15967", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15967" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "chromium-browser: Use after free in payments" }, { "cve": "CVE-2020-15968", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885884" } ], "notes": [ { "category": "description", "text": "Use after free in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15968" }, { "category": "external", "summary": "RHBZ#1885884", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885884" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15968" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in Blink" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" }, { "cve": "CVE-2020-15970", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885886" } ], "notes": [ { "category": "description", "text": "Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in NFC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15970" }, { "category": "external", "summary": "RHBZ#1885886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15970", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15970" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in NFC" }, { "cve": "CVE-2020-15971", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885887" } ], "notes": [ { "category": "description", "text": "Use after free in printing in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in printing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15971" }, { "category": "external", "summary": "RHBZ#1885887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885887" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15971", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15971" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15971", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15971" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in printing" }, { "cve": "CVE-2020-15972", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885888" } ], "notes": [ { "category": "description", "text": "Use after free in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in audio", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15972" }, { "category": "external", "summary": "RHBZ#1885888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15972", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15972" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15972", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15972" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in audio" }, { "cve": "CVE-2020-15973", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885891" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in extensions in Google Chrome prior to 86.0.4240.75 allowed an attacker who convinced a user to install a malicious extension to bypass same origin policy via a crafted Chrome Extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient policy enforcement in extensions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15973" }, { "category": "external", "summary": "RHBZ#1885891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15973", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15973" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15973", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15973" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Insufficient policy enforcement in extensions" }, { "cve": "CVE-2020-15974", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885892" } ], "notes": [ { "category": "description", "text": "Integer overflow in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to bypass site isolation via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15974" }, { "category": "external", "summary": "RHBZ#1885892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15974", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15974" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15974", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15974" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Integer overflow in Blink" }, { "cve": "CVE-2020-15975", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885893" } ], "notes": [ { "category": "description", "text": "Integer overflow in SwiftShader in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in SwiftShader", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15975" }, { "category": "external", "summary": "RHBZ#1885893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15975", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15975" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15975", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15975" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Integer overflow in SwiftShader" }, { "cve": "CVE-2020-15976", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885894" } ], "notes": [ { "category": "description", "text": "Use after free in WebXR in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebXR", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15976" }, { "category": "external", "summary": "RHBZ#1885894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15976", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15976" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15976", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15976" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Use after free in WebXR" }, { "cve": "CVE-2020-15977", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885897" } ], "notes": [ { "category": "description", "text": "Insufficient data validation in dialogs in Google Chrome on OS X prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient data validation in dialogs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15977" }, { "category": "external", "summary": "RHBZ#1885897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15977", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15977" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15977", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15977" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Insufficient data validation in dialogs" }, { "cve": "CVE-2020-15978", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885899" } ], "notes": [ { "category": "description", "text": "Insufficient data validation in navigation in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient data validation in navigation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15978" }, { "category": "external", "summary": "RHBZ#1885899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15978", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15978" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15978", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15978" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Insufficient data validation in navigation" }, { "cve": "CVE-2020-15979", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885901" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in V8", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15979" }, { "category": "external", "summary": "RHBZ#1885901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15979", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15979" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in V8" }, { "cve": "CVE-2020-15980", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885902" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in Intents in Google Chrome on Android prior to 86.0.4240.75 allowed a local attacker to bypass navigation restrictions via crafted Intents.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient policy enforcement in Intents", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15980" }, { "category": "external", "summary": "RHBZ#1885902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885902" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15980", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15980" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15980", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15980" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Insufficient policy enforcement in Intents" }, { "cve": "CVE-2020-15981", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885903" } ], "notes": [ { "category": "description", "text": "Out of bounds read in audio in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Out of bounds read in audio", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15981" }, { "category": "external", "summary": "RHBZ#1885903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15981", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15981" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15981", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15981" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Out of bounds read in audio" }, { "cve": "CVE-2020-15982", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885904" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in cache in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Side-channel information leakage in cache", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15982" }, { "category": "external", "summary": "RHBZ#1885904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15982", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15982" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15982", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15982" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Side-channel information leakage in cache" }, { "cve": "CVE-2020-15983", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885905" } ], "notes": [ { "category": "description", "text": "Insufficient data validation in webUI in Google Chrome on ChromeOS prior to 86.0.4240.75 allowed a local attacker to bypass content security policy via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient data validation in webUI", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15983" }, { "category": "external", "summary": "RHBZ#1885905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15983", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15983" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Insufficient data validation in webUI" }, { "cve": "CVE-2020-15984", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885906" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in Omnibox in Google Chrome on iOS prior to 86.0.4240.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted URL.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient policy enforcement in Omnibox", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15984" }, { "category": "external", "summary": "RHBZ#1885906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15984", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15984" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15984", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15984" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Insufficient policy enforcement in Omnibox" }, { "cve": "CVE-2020-15985", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885907" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in Blink in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to spoof security UI via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in Blink", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15985" }, { "category": "external", "summary": "RHBZ#1885907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15985", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15985" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15985", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15985" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in Blink" }, { "cve": "CVE-2020-15986", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885908" } ], "notes": [ { "category": "description", "text": "Integer overflow in media in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Integer overflow in media", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15986" }, { "category": "external", "summary": "RHBZ#1885908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885908" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15986", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15986" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15986", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15986" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Integer overflow in media" }, { "cve": "CVE-2020-15987", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885909" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC stream.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15987" }, { "category": "external", "summary": "RHBZ#1885909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15987", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15987" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15987", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15987" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Use after free in WebRTC" }, { "cve": "CVE-2020-15988", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885911" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient policy enforcement in downloads", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15988" }, { "category": "external", "summary": "RHBZ#1885911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15988", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15988" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15988", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15988" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Insufficient policy enforcement in downloads" }, { "cve": "CVE-2020-15989", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885912" } ], "notes": [ { "category": "description", "text": "Uninitialized data in PDFium in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted PDF file.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Uninitialized use in PDFium", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15989" }, { "category": "external", "summary": "RHBZ#1885912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15989", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15989" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15989", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15989" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "chromium-browser: Uninitialized use in PDFium" }, { "cve": "CVE-2020-15990", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885889" } ], "notes": [ { "category": "description", "text": "Use after free in autofill in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in autofill", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15990" }, { "category": "external", "summary": "RHBZ#1885889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15990", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15990" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in autofill" }, { "cve": "CVE-2020-15991", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885890" } ], "notes": [ { "category": "description", "text": "Use after free in password manager in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in password manager", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15991" }, { "category": "external", "summary": "RHBZ#1885890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15991", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15991" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15991", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15991" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in password manager" }, { "cve": "CVE-2020-15992", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885910" } ], "notes": [ { "category": "description", "text": "Insufficient policy enforcement in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Insufficient policy enforcement in networking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15992" }, { "category": "external", "summary": "RHBZ#1885910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15992", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15992" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15992", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15992" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-13T08:22:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Chromium must be restarted for the changes to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4235" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Client-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Server-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-0:86.0.4240.75-1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:chromium-browser-debuginfo-0:86.0.4240.75-1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Insufficient policy enforcement in networking" } ] }
rhsa-2020_4315
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for firefox is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 78.4.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4315", "url": "https://access.redhat.com/errata/RHSA-2020:4315" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4315.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T15:51:24+00:00", "generator": { "date": "2024-11-22T15:51:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4315", "initial_release_date": "2020-10-22T17:39:51+00:00", "revision_history": [ { "date": "2020-10-22T17:39:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-22T17:39:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:51:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_1.s390x", "product": { "name": "firefox-0:78.4.0-1.el8_1.s390x", "product_id": "firefox-0:78.4.0-1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_1.s390x", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_1.s390x", "product_id": "firefox-debugsource-0:78.4.0-1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_1.x86_64", "product": { "name": "firefox-0:78.4.0-1.el8_1.x86_64", "product_id": "firefox-0:78.4.0-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_1.x86_64", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_1.x86_64", "product_id": "firefox-debugsource-0:78.4.0-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_1.ppc64le", "product": { "name": "firefox-0:78.4.0-1.el8_1.ppc64le", "product_id": "firefox-0:78.4.0-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "product_id": "firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_1.aarch64", "product": { "name": "firefox-0:78.4.0-1.el8_1.aarch64", "product_id": "firefox-0:78.4.0-1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "product_id": "firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_1.src", "product": { "name": "firefox-0:78.4.0-1.el8_1.src", "product_id": "firefox-0:78.4.0-1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.aarch64" }, "product_reference": "firefox-0:78.4.0-1.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.ppc64le" }, "product_reference": "firefox-0:78.4.0-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.s390x" }, "product_reference": "firefox-0:78.4.0-1.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.src" }, "product_reference": "firefox-0:78.4.0-1.el8_1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.x86_64" }, "product_reference": "firefox-0:78.4.0-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.aarch64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.aarch64" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.ppc64le" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.s390x" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_1.s390x", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.x86_64" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-22T17:39:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4315" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-22T17:39:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4315" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:firefox-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.aarch64", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.s390x", "AppStream-8.1.0.Z.EUS:firefox-debugsource-0:78.4.0-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4311
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for firefox is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 78.4.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4311", "url": "https://access.redhat.com/errata/RHSA-2020:4311" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4311.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T15:51:39+00:00", "generator": { "date": "2024-11-22T15:51:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4311", "initial_release_date": "2020-10-22T16:35:55+00:00", "revision_history": [ { "date": "2020-10-22T16:35:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-22T16:35:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:51:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_0.x86_64", "product": { "name": "firefox-0:78.4.0-1.el8_0.x86_64", "product_id": "firefox-0:78.4.0-1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_0.x86_64", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_0.x86_64", "product_id": "firefox-debugsource-0:78.4.0-1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_0.ppc64le", "product": { "name": "firefox-0:78.4.0-1.el8_0.ppc64le", "product_id": "firefox-0:78.4.0-1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "product": { "name": "firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "product_id": "firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debugsource@78.4.0-1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "product_id": "firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el8_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el8_0.src", "product": { "name": "firefox-0:78.4.0-1.el8_0.src", "product_id": "firefox-0:78.4.0-1.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el8_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.ppc64le" }, "product_reference": "firefox-0:78.4.0-1.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.src" }, "product_reference": "firefox-0:78.4.0-1.el8_0.src", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.x86_64" }, "product_reference": "firefox-0:78.4.0-1.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.ppc64le" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debugsource-0:78.4.0-1.el8_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.0)", "product_id": "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.x86_64" }, "product_reference": "firefox-debugsource-0:78.4.0-1.el8_0.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-22T16:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4311" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-22T16:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4311" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.src", "AppStream-8.0.0.Z.E4S:firefox-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debuginfo-0:78.4.0-1.el8_0.x86_64", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.ppc64le", "AppStream-8.0.0.Z.E4S:firefox-debugsource-0:78.4.0-1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4913
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for thunderbird is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.4.0.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4913", "url": "https://access.redhat.com/errata/RHSA-2020:4913" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4913.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T15:52:03+00:00", "generator": { "date": "2024-11-22T15:52:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4913", "initial_release_date": "2020-11-04T13:28:29+00:00", "revision_history": [ { "date": "2020-11-04T13:28:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-04T13:28:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:52:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_3.x86_64", "product": { "name": "thunderbird-0:78.4.0-1.el8_3.x86_64", "product_id": "thunderbird-0:78.4.0-1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_3.ppc64le", "product": { "name": "thunderbird-0:78.4.0-1.el8_3.ppc64le", "product_id": "thunderbird-0:78.4.0-1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_3.aarch64", "product": { "name": "thunderbird-0:78.4.0-1.el8_3.aarch64", "product_id": "thunderbird-0:78.4.0-1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_3.src", "product": { "name": "thunderbird-0:78.4.0-1.el8_3.src", "product_id": "thunderbird-0:78.4.0-1.el8_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_3?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.aarch64" }, "product_reference": "thunderbird-0:78.4.0-1.el8_3.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.ppc64le" }, "product_reference": "thunderbird-0:78.4.0-1.el8_3.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_3.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.src" }, "product_reference": "thunderbird-0:78.4.0-1.el8_3.src", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el8_3.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64", "relates_to_product_reference": "AppStream-8.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T13:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4913" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T13:28:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4913" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.src", "AppStream-8.3.0.Z.MAIN:thunderbird-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debuginfo-0:78.4.0-1.el8_3.x86_64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.aarch64", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.ppc64le", "AppStream-8.3.0.Z.MAIN:thunderbird-debugsource-0:78.4.0-1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4945
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for thunderbird is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.4.0.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4945", "url": "https://access.redhat.com/errata/RHSA-2020:4945" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4945.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T15:52:10+00:00", "generator": { "date": "2024-11-22T15:52:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4945", "initial_release_date": "2020-11-05T09:08:47+00:00", "revision_history": [ { "date": "2020-11-05T09:08:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-05T09:08:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:52:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_1.x86_64", "product": { "name": "thunderbird-0:78.4.0-1.el8_1.x86_64", "product_id": "thunderbird-0:78.4.0-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_1.ppc64le", "product": { "name": "thunderbird-0:78.4.0-1.el8_1.ppc64le", "product_id": "thunderbird-0:78.4.0-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_1.src", "product": { "name": "thunderbird-0:78.4.0-1.el8_1.src", "product_id": "thunderbird-0:78.4.0-1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.ppc64le" }, "product_reference": "thunderbird-0:78.4.0-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.src" }, "product_reference": "thunderbird-0:78.4.0-1.el8_1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.1)", "product_id": "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-05T09:08:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4945" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-05T09:08:47+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4945" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.src", "AppStream-8.1.0.Z.EUS:thunderbird-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_1.x86_64", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.ppc64le", "AppStream-8.1.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4310
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for firefox is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 78.4.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4310", "url": "https://access.redhat.com/errata/RHSA-2020:4310" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4310.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T15:51:17+00:00", "generator": { "date": "2024-11-22T15:51:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4310", "initial_release_date": "2020-10-22T17:24:03+00:00", "revision_history": [ { "date": "2020-10-22T17:24:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-22T17:24:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:51:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el7_9.x86_64", "product": { "name": "firefox-0:78.4.0-1.el7_9.x86_64", "product_id": "firefox-0:78.4.0-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "product_id": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el7_9.src", "product": { "name": "firefox-0:78.4.0-1.el7_9.src", "product_id": "firefox-0:78.4.0-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el7_9.i686", "product": { "name": "firefox-0:78.4.0-1.el7_9.i686", "product_id": "firefox-0:78.4.0-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el7_9?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el7_9.s390x", "product": { "name": "firefox-0:78.4.0-1.el7_9.s390x", "product_id": "firefox-0:78.4.0-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "product_id": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el7_9.ppc64", "product": { "name": "firefox-0:78.4.0-1.el7_9.ppc64", "product_id": "firefox-0:78.4.0-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "product_id": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el7_9?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-1.el7_9.ppc64le", "product": { "name": "firefox-0:78.4.0-1.el7_9.ppc64le", "product_id": "firefox-0:78.4.0-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "product": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "product_id": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-1.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.i686" }, "product_reference": "firefox-0:78.4.0-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.src" }, "product_reference": "firefox-0:78.4.0-1.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686" }, "product_reference": "firefox-0:78.4.0-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src" }, "product_reference": "firefox-0:78.4.0-1.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.i686" }, "product_reference": "firefox-0:78.4.0-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.src" }, "product_reference": "firefox-0:78.4.0-1.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686" }, "product_reference": "firefox-0:78.4.0-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src" }, "product_reference": "firefox-0:78.4.0-1.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.i686" }, "product_reference": "firefox-0:78.4.0-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.src" }, "product_reference": "firefox-0:78.4.0-1.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686" }, "product_reference": "firefox-0:78.4.0-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src" }, "product_reference": "firefox-0:78.4.0-1.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-22T17:24:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4310" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-22T17:24:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4310" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Client-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Client-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Server-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.i686", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.src", "7Workstation-optional-7.9.Z:firefox-0:78.4.0-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.s390x", "7Workstation-optional-7.9.Z:firefox-debuginfo-0:78.4.0-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4948
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for thunderbird is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.4.0.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4948", "url": "https://access.redhat.com/errata/RHSA-2020:4948" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4948.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T15:51:17+00:00", "generator": { "date": "2024-11-22T15:51:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4948", "initial_release_date": "2020-11-05T08:57:30+00:00", "revision_history": [ { "date": "2020-11-05T08:57:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-05T08:57:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:51:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_2.x86_64", "product": { "name": "thunderbird-0:78.4.0-1.el8_2.x86_64", "product_id": "thunderbird-0:78.4.0-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_2.ppc64le", "product": { "name": "thunderbird-0:78.4.0-1.el8_2.ppc64le", "product_id": "thunderbird-0:78.4.0-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_2.aarch64", "product": { "name": "thunderbird-0:78.4.0-1.el8_2.aarch64", "product_id": "thunderbird-0:78.4.0-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "product": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "product_id": "thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debugsource@78.4.0-1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el8_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el8_2.src", "product": { "name": "thunderbird-0:78.4.0-1.el8_2.src", "product_id": "thunderbird-0:78.4.0-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.aarch64" }, "product_reference": "thunderbird-0:78.4.0-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.ppc64le" }, "product_reference": "thunderbird-0:78.4.0-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.src" }, "product_reference": "thunderbird-0:78.4.0-1.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64" }, "product_reference": "thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-05T08:57:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-05T08:57:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4948" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.src", "AppStream-8.2.0.Z.EUS:thunderbird-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debuginfo-0:78.4.0-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:thunderbird-debugsource-0:78.4.0-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4330
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for firefox is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 78.4.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4330", "url": "https://access.redhat.com/errata/RHSA-2020:4330" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4330.json" } ], "title": "Red Hat Security Advisory: firefox security update", "tracking": { "current_release_date": "2024-11-22T15:51:47+00:00", "generator": { "date": "2024-11-22T15:51:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4330", "initial_release_date": "2020-10-26T09:08:40+00:00", "revision_history": [ { "date": "2020-10-26T09:08:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-26T09:08:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:51:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-2.el6_10.i686", "product": { "name": "firefox-0:78.4.0-2.el6_10.i686", "product_id": "firefox-0:78.4.0-2.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-2.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-2.el6_10.x86_64", "product": { "name": "firefox-0:78.4.0-2.el6_10.x86_64", "product_id": "firefox-0:78.4.0-2.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-2.el6_10?arch=x86_64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "product": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "product_id": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-2.el6_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-2.el6_10.src", "product": { "name": "firefox-0:78.4.0-2.el6_10.src", "product_id": "firefox-0:78.4.0-2.el6_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-2.el6_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-2.el6_10.ppc64", "product": { "name": "firefox-0:78.4.0-2.el6_10.ppc64", "product_id": "firefox-0:78.4.0-2.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-2.el6_10?arch=ppc64" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "product": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "product_id": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-2.el6_10?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "firefox-0:78.4.0-2.el6_10.s390x", "product": { "name": "firefox-0:78.4.0-2.el6_10.s390x", "product_id": "firefox-0:78.4.0-2.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox@78.4.0-2.el6_10?arch=s390x" } } }, { "category": "product_version", "name": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "product": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "product_id": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/firefox-debuginfo@78.4.0-2.el6_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.i686" }, "product_reference": "firefox-0:78.4.0-2.el6_10.i686", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.src" }, "product_reference": "firefox-0:78.4.0-2.el6_10.src", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Client-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686" }, "product_reference": "firefox-0:78.4.0-2.el6_10.i686", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src" }, "product_reference": "firefox-0:78.4.0-2.el6_10.src", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Client-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686" }, "product_reference": "firefox-0:78.4.0-2.el6_10.i686", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src" }, "product_reference": "firefox-0:78.4.0-2.el6_10.src", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.i686" }, "product_reference": "firefox-0:78.4.0-2.el6_10.i686", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.src" }, "product_reference": "firefox-0:78.4.0-2.el6_10.src", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Server-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686" }, "product_reference": "firefox-0:78.4.0-2.el6_10.i686", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src" }, "product_reference": "firefox-0:78.4.0-2.el6_10.src", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Server-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.i686" }, "product_reference": "firefox-0:78.4.0-2.el6_10.i686", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.src" }, "product_reference": "firefox-0:78.4.0-2.el6_10.src", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Workstation-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686" }, "product_reference": "firefox-0:78.4.0-2.el6_10.i686", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src" }, "product_reference": "firefox-0:78.4.0-2.el6_10.src", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "relates_to_product_reference": "6Workstation-optional-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" }, "product_reference": "firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "relates_to_product_reference": "6Workstation-optional-6.10.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-26T09:08:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4330" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-26T09:08:40+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the update, Firefox must be restarted for the changes to take effect.", "product_ids": [ "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4330" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Client-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Client-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6ComputeNode-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6ComputeNode-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Server-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Server-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.i686", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.src", "6Workstation-optional-6.10.z:firefox-0:78.4.0-2.el6_10.x86_64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.ppc64", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.s390x", "6Workstation-optional-6.10.z:firefox-debuginfo-0:78.4.0-2.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
rhsa-2020_4909
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for thunderbird is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 78.4.0.\n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4909", "url": "https://access.redhat.com/errata/RHSA-2020:4909" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4909.json" } ], "title": "Red Hat Security Advisory: thunderbird security update", "tracking": { "current_release_date": "2024-11-22T15:51:54+00:00", "generator": { "date": "2024-11-22T15:51:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4909", "initial_release_date": "2020-11-04T14:28:10+00:00", "revision_history": [ { "date": "2020-11-04T14:28:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-11-04T14:28:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:51:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el7_9.x86_64", "product": { "name": "thunderbird-0:78.4.0-1.el7_9.x86_64", "product_id": "thunderbird-0:78.4.0-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el7_9.src", "product": { "name": "thunderbird-0:78.4.0-1.el7_9.src", "product_id": "thunderbird-0:78.4.0-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "thunderbird-0:78.4.0-1.el7_9.ppc64le", "product": { "name": "thunderbird-0:78.4.0-1.el7_9.ppc64le", "product_id": "thunderbird-0:78.4.0-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird@78.4.0-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "product": { "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "product_id": "thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/thunderbird-debuginfo@78.4.0-1.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "thunderbird-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src" }, "product_reference": "thunderbird-0:78.4.0-1.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "thunderbird-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src" }, "product_reference": "thunderbird-0:78.4.0-1.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "thunderbird-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src" }, "product_reference": "thunderbird-0:78.4.0-1.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "thunderbird-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64" }, "product_reference": "thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Mozilla project" ] }, { "names": [ "Philipp", "Simon Giesecke", "Christian Holler", "Jason Kratzer" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15683", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889932" } ], "notes": [ { "category": "description", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.4, Firefox \u003c 82, and Thunderbird \u003c 78.4.", "title": "Vulnerability description" }, { "category": "summary", "text": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15683" }, { "category": "external", "summary": "RHBZ#1889932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889932" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15683" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15683" }, { "category": "external", "summary": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-46/#CVE-2020-15683" } ], "release_date": "2020-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T14:28:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4909" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4" }, { "cve": "CVE-2020-15969", "discovery_date": "2020-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1885885" } ], "notes": [ { "category": "description", "text": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in WebRTC", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15969" }, { "category": "external", "summary": "RHBZ#1885885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885885" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "category": "external", "summary": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" } ], "release_date": "2020-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-11-04T14:28:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to take effect.", "product_ids": [ "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4909" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Client-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Client-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Server-optional-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Server-optional-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.src", "7Workstation-7.9.Z:thunderbird-0:78.4.0-1.el7_9.x86_64", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.ppc64le", "7Workstation-7.9.Z:thunderbird-debuginfo-0:78.4.0-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in WebRTC" } ] }
var-202011-0444
Vulnerability from variot
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Google Chrome is a web browser developed by Google (Google). Chrome has security holes. 8.0) - aarch64, ppc64le, s390x, x86_64
- Description:
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave
macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212011.
AMD Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2020-27914: Yu Wang of Didi Research America CVE-2020-27915: Yu Wang of Didi Research America
App Store Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to gain elevated privileges Description: This issue was addressed by removing the vulnerable code. CVE-2020-27903: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab
AppleGraphicsControl Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A validation issue was addressed with improved logic. CVE-2020-27941: shrek_wzw
AppleMobileFileIntegrity Available for: macOS Big Sur 11.0.1 Impact: A malicious application may be able to bypass Privacy preferences Description: This issue was addressed with improved checks. CVE-2020-29621: Wojciech Reguła (@_r3ggi) of SecuRing
Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-27910: JunDong Xie and XingWei Lin of Ant Security Light- Year Lab
Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9943: JunDong Xie of Ant Security Light-Year Lab
Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9944: JunDong Xie of Ant Security Light-Year Lab
Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27916: JunDong Xie of Ant Security Light-Year Lab
Bluetooth Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected application termination or heap corruption Description: Multiple integer overflows were addressed with improved input validation. CVE-2020-27906: Zuozhi Fan (@pattern_F_) of Ant Group Tianqiong Security Lab
CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab
CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9960: JunDong Xie and XingWei Lin of Ant Security Light-Year Lab CVE-2020-27908: JunDong Xie and XingWei Lin of Ant Security Light- Year Lab
CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-10017: Francis working with Trend Micro Zero Day Initiative, JunDong Xie of Ant Security Light-Year Lab
CoreText Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A logic issue was addressed with improved state management. CVE-2020-27922: Mickey Jin of Trend Micro
FontParser Available for: macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An information disclosure issue was addressed with improved state management. CVE-2020-27946: Mateusz Jurczyk of Google Project Zero
FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A buffer overflow was addressed with improved size validation. CVE-2020-9962: Yiğit Can YILMAZ (@yilmazcanyigit)
FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27952: an anonymous researcher, Mickey Jin and Junzhi Lu of Trend Micro
FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9956: Mickey Jin and Junzhi Lu of Trend Micro Mobile Security Research Team working with Trend Micro’s Zero Day Initiative
FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. CVE-2020-27931: Apple CVE-2020-27943: Mateusz Jurczyk of Google Project Zero CVE-2020-27944: Mateusz Jurczyk of Google Project Zero
Foundation Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A local user may be able to read arbitrary files Description: A logic issue was addressed with improved state management. CVE-2020-10002: James Hutchins
Graphics Drivers Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2020-27947: ABC Research s.r.o. working with Trend Micro Zero Day Initiative
Graphics Drivers Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-29612: ABC Research s.r.o. working with Trend Micro Zero Day Initiative
HomeKit Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An attacker in a privileged network position may be able to unexpectedly alter application state Description: This issue was addressed with improved setting propagation. CVE-2020-9978: Luyi Xing, Dongfang Zhao, and Xiaofeng Wang of Indiana University Bloomington, Yan Jia of Xidian University and University of Chinese Academy of Sciences, and Bin Yuan of HuaZhong University of Science and Technology
Image Processing Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27919: Hou JingYi (@hjy79425575) of Qihoo 360 CERT, Xingwei Lin of Ant Security Light-Year Lab
ImageIO Available for: macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2020-29616: zhouat working with Trend Micro Zero Day Initiative
ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-27924: Lei Sun CVE-2020-29618: XingWei Lin of Ant Security Light-Year Lab
ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-29611: Ivan Fratric of Google Project Zero
ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to heap corruption Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-29617: XingWei Lin of Ant Security Light-Year Lab CVE-2020-29619: XingWei Lin of Ant Security Light-Year Lab
ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27912: Xingwei Lin of Ant Security Light-Year Lab CVE-2020-27923: Lei Sun
Intel Graphics Driver Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-10015: ABC Research s.r.o. working with Trend Micro Zero Day Initiative CVE-2020-27897: Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc. and Luyi Xing of Indiana University Bloomington
Intel Graphics Driver Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2020-27907: ABC Research s.r.o. working with Trend Micro Zero Day Initiative
Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to determine kernel memory layout Description: A logic issue was addressed with improved state management. CVE-2020-9974: Tommy Muir (@Muirey03)
Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2020-10016: Alex Helie
Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2020-9967: Alex Plaskett (@alexjplaskett)
Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2020-9975: Tielei Wang of Pangu Lab
Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved state handling. CVE-2020-27921: Linus Henze (pinauten.de)
Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application may cause unexpected changes in memory belonging to processes traced by DTrace Description: This issue was addressed with improved checks to prevent unauthorized actions. CVE-2020-27949: Steffen Klee (@_kleest) of TU Darmstadt, Secure Mobile Networking Lab
Kernel Available for: macOS Big Sur 11.0.1 Impact: A malicious application may be able to elevate privileges Description: This issue was addressed with improved entitlements. CVE-2020-29620: Csaba Fitzl (@theevilbit) of Offensive Security
libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An integer overflow was addressed through improved input validation. CVE-2020-27911: found by OSS-Fuzz
libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing maliciously crafted web content may lead to code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-27920: found by OSS-Fuzz
libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-27926: found by OSS-Fuzz
libxpc Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to break out of its sandbox Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2020-10014: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab
Logging Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A local attacker may be able to elevate their privileges Description: A path handling issue was addressed with improved validation. CVE-2020-10010: Tommy Muir (@Muirey03)
Model I/O Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-13524: Aleksandar Nikolic of Cisco Talos
Model I/O Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: A logic issue was addressed with improved state management. CVE-2020-10004: Aleksandar Nikolic of Cisco Talos
NSRemoteView Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved restrictions. CVE-2020-27901: Thijs Alkemade of Computest Research Division
Power Management Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to determine kernel memory layout Description: A logic issue was addressed with improved state management. CVE-2020-10007: singi@theori working with Trend Micro Zero Day Initiative
Quick Look Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted document may lead to a cross site scripting attack Description: An access issue was addressed with improved access restrictions. CVE-2020-10012: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu of Palo Alto Networks (paloaltonetworks.com)
Ruby Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to modify the file system Description: A path handling issue was addressed with improved validation. CVE-2020-27896: an anonymous researcher
System Preferences Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved state management. CVE-2020-10009: Thijs Alkemade of Computest Research Division
WebRTC Available for: macOS Big Sur 11.0.1 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-15969: an anonymous researcher
Wi-Fi Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An attacker may be able to bypass Managed Frame Protection Description: A denial of service issue was addressed with improved state handling. CVE-2020-27898: Stephan Marais of University of Johannesburg
Installation note:
macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl/YBj8ACgkQZcsbuWJ6 jjCVjw//QGrhMvU+nyuS1UwWs7rcqDJDNh0Zb7yUJali2Bdc9/l++i2pLFbmAwes 7AYCag+T3h3aP7YJAN13zb8KBmUcmnWkWupfx8kEGqHxSXnQTXvaEI59RyCobOCj OVPtboPMH1d94+6dABMp9kiLAHoZezm3hdF8ShT2Hqgq2TB16wZsa/EvhJVSaduA 7RttG6EHBTin6UU3M/+vcfJWqkg4O0YuZpQaconDa5Pd81jpUMeduzfRvS5i+PVS cehtHPWjCN15+sQ29q11yhP3v+sYh0DJEl2LWaBnDo2TlC1gHx70H5ZsAFLHChcd rXkl1tm6GV3UWVhFq0jQc1DP+IwbuL6jHI/wIjYx7itk9XECppyhhiuImOaLiIUH CBgAjwVHY1GUdTH97iPEQFF61v3sjpRLleLMZW7+9ZTt4pEDwMVHk9vKgVK5BUa6 lrKWtBHL3AtaXtxC9y8XGe3IYEBLAszHMUJfF1BR+D/niDRlztvoj72/3PPwtk2t tuUE9RGzpSXCQ1CX6vW7zS2ddVmQfJqcPX721k4OVpFNlMXkjZkm2Q/xwr5qq99v Up9BA+ITksthGYfGAY5bBV1LsjK1NtdNHQGpZe4l9bu4ONgUvmL8iBb/LnS6wKB1 HGcdHEmXvbx+Akl/fvTdG8RSvyoYuFJHkuYv0DMWiri8yN1q+C4= =osnP -----END PGP SIGNATURE-----
. 8) - aarch64, ppc64le, x86_64
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3
iOS 14.3 and iPadOS 14.3 addresses the following issues. CVE-2020-15969: an anonymous researcher
Installation note:
This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. Summary:
An update for thunderbird is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 78.4.0.
Security Fix(es):
-
Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683)
-
chromium-browser: Use after free in WebRTC (CVE-2020-15969)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of Thunderbird must be restarted for the update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1885885 - CVE-2020-15969 chromium-browser: Use after free in WebRTC 1889932 - CVE-2020-15683 Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: thunderbird-78.4.0-1.el7_9.src.rpm
x86_64: thunderbird-78.4.0-1.el7_9.x86_64.rpm thunderbird-debuginfo-78.4.0-1.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
Source: thunderbird-78.4.0-1.el7_9.src.rpm
ppc64le: thunderbird-78.4.0-1.el7_9.ppc64le.rpm thunderbird-debuginfo-78.4.0-1.el7_9.ppc64le.rpm
x86_64: thunderbird-78.4.0-1.el7_9.x86_64.rpm thunderbird-debuginfo-78.4.0-1.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: thunderbird-78.4.0-1.el7_9.src.rpm
x86_64: thunderbird-78.4.0-1.el7_9.x86_64.rpm thunderbird-debuginfo-78.4.0-1.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-15683 https://access.redhat.com/security/cve/CVE-2020-15969 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBX6K5DdzjgjWX9erEAQjw4A//eWtdc4EzxM8leWC6YCWJvbjVnJz+Y4l6 qo024EcJB/gVKIuiv90JRE0cOguAKG9ahcUtZSegCGEcdj3xHQ1/z3ur4L4n0Y3n ph+OAIN+ujfXboT7yPHLD8gZF3oc3pRHDjqQvWbcjaXyl/miGevO0M19JnvbXINR ZbvQU2wFyCoz+ngC30Yfp6c+FgsriU1P+tkiv+f2IApfiqVe9WDgSwaSC3QVtOha 5V0Xa2aTEpikjfugeQUUKZcUJJtXmVF+WTZ9CQJOPlma0vs3/byBp43xND7i2/bi 5hAb2yIvrzoCvaQqd+9rsMT0JKoDdD4BW0585GL2qDvTNWWH6ptYSeE9aEOHrqoG dgyCRcHuaG31ZFN11eBmyl343Nb4rsEnjvmJmkNvqJzoDJ3NnpfZilb8gO60Fa1C Mf/wQpq8qyIsrDHaaib+CKvLLkgE2nWMhh2gVMJvU51FyuomI9T04mcWSbPFv3/M Lx3/olJpZWfsx6i6uJJJff8rBJmueGTk2OAfHBoLsRzq4STY6L4JwqZFz6qvoDJX vUnzUQ58uZs+7/tqb0h2Npn2VpDHiMmkJSBomFdKnWEis7DGLEmsskzGV5Yk6Oja fSs/vpbN3z/RFvkoor1yI1X+eLi2qT5ZNdUtNPX2t275WkXUR0Kq4wh6Sn3szx21 8QnWZbz7ziQ=bM6p -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
For the stable distribution (buster), these problems have been fixed in version 78.4.0esr-1~deb10u2.
We recommend that you upgrade your firefox-esr packages
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-0444", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "31" }, { "model": "watchos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "7.2" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "tvos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.3" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "32" }, { "model": "backports sle", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.0" }, { "model": "safari", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.0.2" }, { "model": "macos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "11.1" }, { "model": "chrome", "scope": "lt", "trust": 1.0, "vendor": "google", "version": "86.0.4240.75" }, { "model": "ipados", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.3" }, { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "14.3" } ], "sources": [ { "db": "NVD", "id": "CVE-2020-15969" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "86.0.4240.75", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.0.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.3", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-15969" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gentoo", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-368" } ], "trust": 0.6 }, "cve": "CVE-2020-15969", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-169000", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-15969", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202010-368", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-169000", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-169000" }, { "db": "CNNVD", "id": "CNNVD-202010-368" }, { "db": "NVD", "id": "CVE-2020-15969" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Google Chrome is a web browser developed by Google (Google). Chrome has security holes. 8.0) - aarch64, ppc64le, s390x, x86_64\n\n3. Description:\n\nMozilla Firefox is an open-source web browser, designed for standards\ncompliance, performance, and portability. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001\nCatalina, Security Update 2020-007 Mojave\n\nmacOS Big Sur 11.1, Security Update 2020-001 Catalina, Security\nUpdate 2020-007 Mojave addresses the following issues. Information\nabout the security content is also available at\nhttps://support.apple.com/HT212011. \n\nAMD\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to execute arbitrary code\nwith system privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2020-27914: Yu Wang of Didi Research America\nCVE-2020-27915: Yu Wang of Didi Research America\n\nApp Store\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to gain elevated privileges\nDescription: This issue was addressed by removing the vulnerable\ncode. \nCVE-2020-27903: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab\n\nAppleGraphicsControl\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A validation issue was addressed with improved logic. \nCVE-2020-27941: shrek_wzw\n\nAppleMobileFileIntegrity\nAvailable for: macOS Big Sur 11.0.1\nImpact: A malicious application may be able to bypass Privacy\npreferences\nDescription: This issue was addressed with improved checks. \nCVE-2020-29621: Wojciech Regu\u0142a (@_r3ggi) of SecuRing\n\nAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-27910: JunDong Xie and XingWei Lin of Ant Security Light-\nYear Lab\n\nAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2020-9943: JunDong Xie of Ant Security Light-Year Lab\n\nAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2020-9944: JunDong Xie of Ant Security Light-Year Lab\n\nAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-27916: JunDong Xie of Ant Security Light-Year Lab\n\nBluetooth\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A remote attacker may be able to cause unexpected application\ntermination or heap corruption\nDescription: Multiple integer overflows were addressed with improved\ninput validation. \nCVE-2020-27906: Zuozhi Fan (@pattern_F_) of Ant Group Tianqiong\nSecurity Lab\n\nCoreAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab\n\nCoreAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-9960: JunDong Xie and XingWei Lin of Ant Security Light-Year\nLab\nCVE-2020-27908: JunDong Xie and XingWei Lin of Ant Security Light-\nYear Lab\n\nCoreAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-10017: Francis working with Trend Micro Zero Day Initiative,\nJunDong Xie of Ant Security Light-Year Lab\n\nCoreText\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-27922: Mickey Jin of Trend Micro\n\nFontParser\nAvailable for: macOS Big Sur 11.0.1\nImpact: Processing a maliciously crafted font may result in the\ndisclosure of process memory\nDescription: An information disclosure issue was addressed with\nimproved state management. \nCVE-2020-27946: Mateusz Jurczyk of Google Project Zero\n\nFontParser\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A buffer overflow was addressed with improved size\nvalidation. \nCVE-2020-9962: Yi\u011fit Can YILMAZ (@yilmazcanyigit)\n\nFontParser\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-27952: an anonymous researcher, Mickey Jin and Junzhi Lu of\nTrend Micro\n\nFontParser\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-9956: Mickey Jin and Junzhi Lu of Trend Micro Mobile\nSecurity Research Team working with Trend Micro\u2019s Zero Day Initiative\n\nFontParser\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed with improved input validation. \nCVE-2020-27931: Apple\nCVE-2020-27943: Mateusz Jurczyk of Google Project Zero\nCVE-2020-27944: Mateusz Jurczyk of Google Project Zero\n\nFoundation\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A local user may be able to read arbitrary files\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10002: James Hutchins\n\nGraphics Drivers\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2020-27947: ABC Research s.r.o. working with Trend Micro Zero Day\nInitiative\n\nGraphics Drivers\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: A malicious application may be able to execute arbitrary code\nwith system privileges\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-29612: ABC Research s.r.o. working with Trend Micro Zero Day\nInitiative\n\nHomeKit\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An attacker in a privileged network position may be able to\nunexpectedly alter application state\nDescription: This issue was addressed with improved setting\npropagation. \nCVE-2020-9978: Luyi Xing, Dongfang Zhao, and Xiaofeng Wang of Indiana\nUniversity Bloomington, Yan Jia of Xidian University and University\nof Chinese Academy of Sciences, and Bin Yuan of HuaZhong University\nof Science and Technology\n\nImage Processing\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-27919: Hou JingYi (@hjy79425575) of Qihoo 360 CERT, Xingwei\nLin of Ant Security Light-Year Lab\n\nImageIO\nAvailable for: macOS Big Sur 11.0.1\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2020-29616: zhouat working with Trend Micro Zero Day Initiative\n\nImageIO\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-27924: Lei Sun\nCVE-2020-29618: XingWei Lin of Ant Security Light-Year Lab\n\nImageIO\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-29611: Ivan Fratric of Google Project Zero\n\nImageIO\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted image may lead to heap\ncorruption\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-29617: XingWei Lin of Ant Security Light-Year Lab\nCVE-2020-29619: XingWei Lin of Ant Security Light-Year Lab\n\nImageIO\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-27912: Xingwei Lin of Ant Security Light-Year Lab\nCVE-2020-27923: Lei Sun\n\nIntel Graphics Driver\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-10015: ABC Research s.r.o. working with Trend Micro Zero Day\nInitiative\nCVE-2020-27897: Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc. \nand Luyi Xing of Indiana University Bloomington\n\nIntel Graphics Driver\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2020-27907: ABC Research s.r.o. working with Trend Micro Zero Day\nInitiative\n\nKernel\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-9974: Tommy Muir (@Muirey03)\n\nKernel\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2020-10016: Alex Helie\n\nKernel\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A remote attacker may be able to cause unexpected system\ntermination or corrupt kernel memory\nDescription: Multiple memory corruption issues were addressed with\nimproved input validation. \nCVE-2020-9967: Alex Plaskett (@alexjplaskett)\n\nKernel\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-9975: Tielei Wang of Pangu Lab\n\nKernel\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A race condition was addressed with improved state\nhandling. \nCVE-2020-27921: Linus Henze (pinauten.de)\n\nKernel\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: A malicious application may cause unexpected changes in\nmemory belonging to processes traced by DTrace\nDescription: This issue was addressed with improved checks to prevent\nunauthorized actions. \nCVE-2020-27949: Steffen Klee (@_kleest) of TU Darmstadt, Secure\nMobile Networking Lab\n\nKernel\nAvailable for: macOS Big Sur 11.0.1\nImpact: A malicious application may be able to elevate privileges\nDescription: This issue was addressed with improved entitlements. \nCVE-2020-29620: Csaba Fitzl (@theevilbit) of Offensive Security\n\nlibxml2\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An integer overflow was addressed through improved input\nvalidation. \nCVE-2020-27911: found by OSS-Fuzz\n\nlibxml2\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing maliciously crafted web content may lead to code\nexecution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-27920: found by OSS-Fuzz\n\nlibxml2\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-27926: found by OSS-Fuzz\n\nlibxpc\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to break out of its\nsandbox\nDescription: A parsing issue in the handling of directory paths was\naddressed with improved path validation. \nCVE-2020-10014: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab\n\nLogging\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A local attacker may be able to elevate their privileges\nDescription: A path handling issue was addressed with improved\nvalidation. \nCVE-2020-10010: Tommy Muir (@Muirey03)\n\nModel I/O\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted USD file may lead to\nunexpected application termination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-13524: Aleksandar Nikolic of Cisco Talos\n\nModel I/O\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Opening a maliciously crafted file may lead to unexpected\napplication termination or arbitrary code execution\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10004: Aleksandar Nikolic of Cisco Talos\n\nNSRemoteView\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A logic issue was addressed with improved restrictions. \nCVE-2020-27901: Thijs Alkemade of Computest Research Division\n\nPower Management\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10007: singi@theori working with Trend Micro Zero Day\nInitiative\n\nQuick Look\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted document may lead to a cross\nsite scripting attack\nDescription: An access issue was addressed with improved access\nrestrictions. \nCVE-2020-10012: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu\nof Palo Alto Networks (paloaltonetworks.com)\n\nRuby\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A remote attacker may be able to modify the file system\nDescription: A path handling issue was addressed with improved\nvalidation. \nCVE-2020-27896: an anonymous researcher\n\nSystem Preferences\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10009: Thijs Alkemade of Computest Research Division\n\nWebRTC\nAvailable for: macOS Big Sur 11.0.1\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-15969: an anonymous researcher\n\nWi-Fi\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An attacker may be able to bypass Managed Frame Protection\nDescription: A denial of service issue was addressed with improved\nstate handling. \nCVE-2020-27898: Stephan Marais of University of Johannesburg\n\nInstallation note:\n\nmacOS Big Sur 11.1, Security Update 2020-001 Catalina, Security\nUpdate 2020-007 Mojave may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nHGcdHEmXvbx+Akl/fvTdG8RSvyoYuFJHkuYv0DMWiri8yN1q+C4=\n=osnP\n-----END PGP SIGNATURE-----\n\n\n. 8) - aarch64, ppc64le, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3\n\niOS 14.3 and iPadOS 14.3 addresses the following issues. \nCVE-2020-15969: an anonymous researcher\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom https://www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. Summary:\n\nAn update for thunderbird is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nMozilla Thunderbird is a standalone mail and newsgroup client. \n\nThis update upgrades Thunderbird to version 78.4.0. \n\nSecurity Fix(es):\n\n* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4\n(CVE-2020-15683)\n\n* chromium-browser: Use after free in WebRTC (CVE-2020-15969)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of Thunderbird must be restarted for the update to\ntake effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1885885 - CVE-2020-15969 chromium-browser: Use after free in WebRTC\n1889932 - CVE-2020-15683 Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nthunderbird-78.4.0-1.el7_9.src.rpm\n\nx86_64:\nthunderbird-78.4.0-1.el7_9.x86_64.rpm\nthunderbird-debuginfo-78.4.0-1.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nSource:\nthunderbird-78.4.0-1.el7_9.src.rpm\n\nppc64le:\nthunderbird-78.4.0-1.el7_9.ppc64le.rpm\nthunderbird-debuginfo-78.4.0-1.el7_9.ppc64le.rpm\n\nx86_64:\nthunderbird-78.4.0-1.el7_9.x86_64.rpm\nthunderbird-debuginfo-78.4.0-1.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nthunderbird-78.4.0-1.el7_9.src.rpm\n\nx86_64:\nthunderbird-78.4.0-1.el7_9.x86_64.rpm\nthunderbird-debuginfo-78.4.0-1.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-15683\nhttps://access.redhat.com/security/cve/CVE-2020-15969\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n8QnWZbz7ziQ=bM6p\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 78.4.0esr-1~deb10u2. \n\nWe recommend that you upgrade your firefox-esr packages", "sources": [ { "db": "NVD", "id": "CVE-2020-15969" }, { "db": "VULHUB", "id": "VHN-169000" }, { "db": "VULMON", "id": "CVE-2020-15969" }, { "db": "PACKETSTORM", "id": "159686" }, { "db": "PACKETSTORM", "id": "159679" }, { "db": "PACKETSTORM", "id": "160538" }, { "db": "PACKETSTORM", "id": "159888" }, { "db": "PACKETSTORM", "id": "160536" }, { "db": "PACKETSTORM", "id": "159906" }, { "db": "PACKETSTORM", "id": "159893" }, { "db": "PACKETSTORM", "id": "168916" }, { "db": "PACKETSTORM", "id": "168919" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-15969", "trust": 2.7 }, { "db": "PACKETSTORM", "id": "159893", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "159679", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "159906", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "160536", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "161131", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "159695", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "159587", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "159536", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "159746", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.3629", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4396", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3733", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3799", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3770", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3701", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3649", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3693", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3667", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3799.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0024", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4196", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3531", "trust": 0.6 }, { "db": "NSFOCUS", "id": "50383", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202010-368", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "160538", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "159888", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "159686", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "159683", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "159909", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "159910", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "160543", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "160542", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "159907", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "160540", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "159682", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-169000", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-15969", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "168916", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "168919", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-169000" }, { "db": "VULMON", "id": "CVE-2020-15969" }, { "db": "PACKETSTORM", "id": "159686" }, { "db": "PACKETSTORM", "id": "159679" }, { "db": "PACKETSTORM", "id": "160538" }, { "db": "PACKETSTORM", "id": "159888" }, { "db": "PACKETSTORM", "id": "160536" }, { "db": "PACKETSTORM", "id": "159906" }, { "db": "PACKETSTORM", "id": "159893" }, { "db": "PACKETSTORM", "id": "168916" }, { "db": "PACKETSTORM", "id": "168919" }, { "db": "CNNVD", "id": "CNNVD-202010-368" }, { "db": "NVD", "id": "CVE-2020-15969" } ] }, "id": "VAR-202011-0444", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-169000" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:49:35.185000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Google Chrome Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=130225" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2020-15969 log" }, { "title": "Red Hat: Critical: chromium-browser security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20204235 - security advisory" }, { "title": "Arch Linux Advisories: [ASA-202010-1] chromium: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-202010-1" }, { "title": "Google Chrome: Stable Channel Update for Desktop", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=chrome_releases\u0026qid=19864a55e2d45827624ffa261a77ce92" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/google-chrome-86-critical-payments-bug-password-check/159938/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-15969" }, { "db": "CNNVD", "id": "CNNVD-202010-368" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-169000" }, { "db": "NVD", "id": "CVE-2020-15969" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" }, { "trust": 1.8, "url": "https://crbug.com/1124659" }, { "trust": 1.7, "url": "https://support.apple.com/kb/ht212003" }, { "trust": 1.7, "url": "https://support.apple.com/kb/ht212005" }, { "trust": 1.7, "url": "https://support.apple.com/kb/ht212007" }, { "trust": 1.7, "url": "https://support.apple.com/kb/ht212009" }, { "trust": 1.7, "url": "https://support.apple.com/kb/ht212011" }, { "trust": 1.7, "url": "https://www.debian.org/security/2021/dsa-4824" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2020/dec/24" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2020/dec/26" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2020/dec/27" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2020/dec/29" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2020/dec/30" }, { "trust": 1.7, "url": "https://security.gentoo.org/glsa/202101-30" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15969" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24qfl4c3azkmfvl7lvsymu2dne5vvugs/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4gwcwnhttyoh6hsfuxpgpbb6j6jyzhze/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/sc3u3h6aisvzb5plzllnf4hmq4uffl7m/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4gwcwnhttyoh6hsfuxpgpbb6j6jyzhze/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/sc3u3h6aisvzb5plzllnf4hmq4uffl7m/" }, { "trust": 0.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/24qfl4c3azkmfvl7lvsymu2dne5vvugs/" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15683" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3701/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/160536/apple-security-advisory-2020-12-14-1.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3733/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3799/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159906/red-hat-security-advisory-2020-4948-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/161131/gentoo-linux-security-advisory-202101-30.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/usersctp-use-after-free-via-sctp-process-a-data-chunk-33635" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/50383" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0024/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159746/gentoo-linux-security-advisory-202010-08.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/chrome-multiple-vulnerabilities-33498" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159695/red-hat-security-advisory-2020-4330-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159587/gentoo-linux-security-advisory-202010-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3531/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4196/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3667/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3629/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159893/red-hat-security-advisory-2020-4909-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3649/" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht212005" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht212009" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4396/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159679/red-hat-security-advisory-2020-4311-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3799.2/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3770/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3693/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/159536/red-hat-security-advisory-2020-4235-01.html" }, { "trust": 0.5, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-15683" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-15969" }, { "trust": 0.5, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.2, "url": "https://www.debian.org/security/faq" }, { "trust": 0.2, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189465" }, { "trust": 0.1, "url": "https://threatpost.com/google-chrome-86-critical-payments-bug-password-check/159938/" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:4317" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:4311" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10014" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13524" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27903" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27910" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27897" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27907" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27912" }, { "trust": 0.1, "url": "https://support.apple.com/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27901" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27896" }, { "trust": 0.1, "url": "https://support.apple.com/ht212011." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27898" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27914" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27908" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27911" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10009" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27915" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10004" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10002" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27916" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10010" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10012" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27906" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10007" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:4913" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27948" }, { "trust": 0.1, "url": "https://support.apple.com/ht212003." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27943" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27946" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27951" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29613" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29618" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29611" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29617" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27944" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:4948" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:4909" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/firefox-esr" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/thunderbird" } ], "sources": [ { "db": "VULHUB", "id": "VHN-169000" }, { "db": "VULMON", "id": "CVE-2020-15969" }, { "db": "PACKETSTORM", "id": "159686" }, { "db": "PACKETSTORM", "id": "159679" }, { "db": "PACKETSTORM", "id": "160538" }, { "db": "PACKETSTORM", "id": "159888" }, { "db": "PACKETSTORM", "id": "160536" }, { "db": "PACKETSTORM", "id": "159906" }, { "db": "PACKETSTORM", "id": "159893" }, { "db": "PACKETSTORM", "id": "168916" }, { "db": "PACKETSTORM", "id": "168919" }, { "db": "CNNVD", "id": "CNNVD-202010-368" }, { "db": "NVD", "id": "CVE-2020-15969" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-169000" }, { "db": "VULMON", "id": "CVE-2020-15969" }, { "db": "PACKETSTORM", "id": "159686" }, { "db": "PACKETSTORM", "id": "159679" }, { "db": "PACKETSTORM", "id": "160538" }, { "db": "PACKETSTORM", "id": "159888" }, { "db": "PACKETSTORM", "id": "160536" }, { "db": "PACKETSTORM", "id": "159906" }, { "db": "PACKETSTORM", "id": "159893" }, { "db": "PACKETSTORM", "id": "168916" }, { "db": "PACKETSTORM", "id": "168919" }, { "db": "CNNVD", "id": "CNNVD-202010-368" }, { "db": "NVD", "id": "CVE-2020-15969" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-03T00:00:00", "db": "VULHUB", "id": "VHN-169000" }, { "date": "2020-11-03T00:00:00", "db": "VULMON", "id": "CVE-2020-15969" }, { "date": "2020-10-22T23:56:11", "db": "PACKETSTORM", "id": "159686" }, { "date": "2020-10-22T17:19:42", "db": "PACKETSTORM", "id": "159679" }, { "date": "2020-12-16T17:58:29", "db": "PACKETSTORM", "id": "160538" }, { "date": "2020-11-04T15:34:38", "db": "PACKETSTORM", "id": "159888" }, { "date": "2020-12-16T17:56:45", "db": "PACKETSTORM", "id": "160536" }, { "date": "2020-11-05T17:00:50", "db": "PACKETSTORM", "id": "159906" }, { "date": "2020-11-04T15:35:33", "db": "PACKETSTORM", "id": "159893" }, { "date": "2020-10-28T19:12:00", "db": "PACKETSTORM", "id": "168916" }, { "date": "2020-10-28T19:12:00", "db": "PACKETSTORM", "id": "168919" }, { "date": "2020-10-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202010-368" }, { "date": "2020-11-03T03:15:12.790000", "db": "NVD", "id": "CVE-2020-15969" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "VULHUB", "id": "VHN-169000" }, { "date": "2021-01-30T00:00:00", "db": "VULMON", "id": "CVE-2020-15969" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202010-368" }, { "date": "2023-11-07T03:17:58.410000", "db": "NVD", "id": "CVE-2020-15969" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-368" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Google Chrome Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-368" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-368" } ], "trust": 0.6 } }
gsd-2020-15969
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-15969", "description": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "id": "GSD-2020-15969", "references": [ "https://www.suse.com/security/cve/CVE-2020-15969.html", "https://www.debian.org/security/2021/dsa-4824", "https://www.debian.org/security/2020/dsa-4780", "https://www.debian.org/security/2020/dsa-4778", "https://access.redhat.com/errata/RHSA-2020:4948", "https://access.redhat.com/errata/RHSA-2020:4947", "https://access.redhat.com/errata/RHSA-2020:4945", "https://access.redhat.com/errata/RHSA-2020:4944", "https://access.redhat.com/errata/RHSA-2020:4913", "https://access.redhat.com/errata/RHSA-2020:4909", "https://access.redhat.com/errata/RHSA-2020:4330", "https://access.redhat.com/errata/RHSA-2020:4317", "https://access.redhat.com/errata/RHSA-2020:4315", "https://access.redhat.com/errata/RHSA-2020:4311", "https://access.redhat.com/errata/RHSA-2020:4310", "https://access.redhat.com/errata/RHSA-2020:4235", "https://ubuntu.com/security/CVE-2020-15969", "https://advisories.mageia.org/CVE-2020-15969.html", "https://security.archlinux.org/CVE-2020-15969", "https://linux.oracle.com/cve/CVE-2020-15969.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-15969" ], "details": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "id": "GSD-2020-15969", "modified": "2023-12-13T01:21:43.442476Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "chrome-cve-admin@google.com", "ID": "CVE-2020-15969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Chrome", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "86.0.4240.75" } ] } } ] }, "vendor_name": "Google" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use after free" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "refsource": "MISC", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" }, { "name": "https://crbug.com/1124659", "refsource": "MISC", "url": "https://crbug.com/1124659" }, { "name": "openSUSE-SU-2020:1829", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "name": "FEDORA-2020-127d40f1ab", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" }, { "name": "FEDORA-2020-8aca25b5c8", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/" }, { "name": "FEDORA-2020-4e8e48da22", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/" }, { "name": "https://support.apple.com/kb/HT212009", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212009" }, { "name": "https://support.apple.com/kb/HT212011", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212011" }, { "name": "https://support.apple.com/kb/HT212005", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212005" }, { "name": "https://support.apple.com/kb/HT212003", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212003" }, { "name": "https://support.apple.com/kb/HT212007", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212007" }, { "name": "20201215 APPLE-SA-2020-12-14-5 watchOS 7.2", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/27" }, { "name": "20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/30" }, { "name": "20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/24" }, { "name": "20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/26" }, { "name": "20201215 APPLE-SA-2020-12-14-7 tvOS 14.3", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Dec/29" }, { "name": "DSA-4824", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4824" }, { "name": "GLSA-202101-30", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-30" } ] } }, "mozilla.org": { "CVE_data_meta": { "ASSIGNER": "security@mozilla.org", "ID": "CVE-2020-15969" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Firefox ESR", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "78.4" } ] } } ] }, "vendor_name": "Mozilla" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free bug in the usersctp library was reported upstream. We assume this could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 78.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free in usersctp" } ] } ] }, "references": { "reference_data": [ { "url": "https://www.mozilla.org/security/advisories/mfsa2020-46/" }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1666570" }, { "url": "https://github.com/sctplab/usrsctp/commit/ffed0925f27d404173c1e3e750d818f432d2c019" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "86.0.4240.75", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.0.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.2", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "chrome-cve-admin@google.com", "ID": "CVE-2020-15969" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" }, { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html", "refsource": "MISC", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" }, { "name": "https://crbug.com/1124659", "refsource": "MISC", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://crbug.com/1124659" }, { "name": "openSUSE-SU-2020:1829", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "name": "FEDORA-2020-127d40f1ab", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/" }, { "name": "FEDORA-2020-8aca25b5c8", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/" }, { "name": "FEDORA-2020-4e8e48da22", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/" }, { "name": "https://support.apple.com/kb/HT212009", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212009" }, { "name": "https://support.apple.com/kb/HT212007", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212007" }, { "name": "https://support.apple.com/kb/HT212005", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212005" }, { "name": "https://support.apple.com/kb/HT212003", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212003" }, { "name": "https://support.apple.com/kb/HT212011", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212011" }, { "name": "20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/30" }, { "name": "20201215 APPLE-SA-2020-12-14-7 tvOS 14.3", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/29" }, { "name": "20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/24" }, { "name": "20201215 APPLE-SA-2020-12-14-5 watchOS 7.2", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/27" }, { "name": "20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Dec/26" }, { "name": "DSA-4824", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4824" }, { "name": "GLSA-202101-30", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-30" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2021-07-21T11:39Z", "publishedDate": "2020-11-03T03:15Z" } } }
ghsa-4932-9h4w-23jv
Vulnerability from github
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
{ "affected": [], "aliases": [ "CVE-2020-15969" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-11-03T03:15:00Z", "severity": "HIGH" }, "details": "Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "id": "GHSA-4932-9h4w-23jv", "modified": "2022-05-24T17:32:51Z", "published": "2022-05-24T17:32:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15969" }, { "type": "WEB", "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html" }, { "type": "WEB", "url": "https://crbug.com/1124659" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202101-30" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT212003" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT212005" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT212007" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT212009" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT212011" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4824" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2020/Dec/24" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2020/Dec/26" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2020/Dec/27" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2020/Dec/29" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2020/Dec/30" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.