Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-6394 (GCVE-0-2020-6394)
Vulnerability from cvelistv5 – Published: 2020-02-11 14:42 – Updated: 2024-08-04 09:02- Insufficient policy enforcement
| URL | Tags |
|---|---|
| https://chromereleases.googleblog.com/2020/02/sta… | x_refsource_MISC |
| https://crbug.com/1014371 | x_refsource_MISC |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| https://access.redhat.com/errata/RHSA-2020:0514 | vendor-advisoryx_refsource_REDHAT |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| https://www.debian.org/security/2020/dsa-4638 | vendor-advisoryx_refsource_DEBIAN |
| https://security.gentoo.org/glsa/202003-08 | vendor-advisoryx_refsource_GENTOO |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T09:02:40.648Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://crbug.com/1014371"
},
{
"name": "openSUSE-SU-2020:0210",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html"
},
{
"name": "RHSA-2020:0514",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0514"
},
{
"name": "openSUSE-SU-2020:0233",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html"
},
{
"name": "DSA-4638",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2020/dsa-4638"
},
{
"name": "GLSA-202003-08",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202003-08"
},
{
"name": "FEDORA-2020-f6271d7afa",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/"
},
{
"name": "FEDORA-2020-39e0b8bd14",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Chrome",
"vendor": "Google",
"versions": [
{
"lessThan": "80.0.3987.87",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Insufficient policy enforcement",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-03-27T12:06:08.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://crbug.com/1014371"
},
{
"name": "openSUSE-SU-2020:0210",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html"
},
{
"name": "RHSA-2020:0514",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0514"
},
{
"name": "openSUSE-SU-2020:0233",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html"
},
{
"name": "DSA-4638",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2020/dsa-4638"
},
{
"name": "GLSA-202003-08",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202003-08"
},
{
"name": "FEDORA-2020-f6271d7afa",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/"
},
{
"name": "FEDORA-2020-39e0b8bd14",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2020-6394",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "80.0.3987.87"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficient policy enforcement"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1014371",
"refsource": "MISC",
"url": "https://crbug.com/1014371"
},
{
"name": "openSUSE-SU-2020:0210",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html"
},
{
"name": "RHSA-2020:0514",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0514"
},
{
"name": "openSUSE-SU-2020:0233",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html"
},
{
"name": "DSA-4638",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2020/dsa-4638"
},
{
"name": "GLSA-202003-08",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202003-08"
},
{
"name": "FEDORA-2020-f6271d7afa",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/"
},
{
"name": "FEDORA-2020-39e0b8bd14",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2020-6394",
"datePublished": "2020-02-11T14:42:11.000Z",
"dateReserved": "2020-01-08T00:00:00.000Z",
"dateUpdated": "2024-08-04T09:02:40.648Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-6394",
"date": "2026-05-20",
"epss": "0.01071",
"percentile": "0.77975"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"80.0.3987.87\", \"matchCriteriaId\": \"330F53AF-8692-40A0-B0F5-347B2F7E8A88\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"40513095-7E6E-46B3-B604-C926F1BA3568\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"284A8DA0-317B-4BBE-AECB-7E91BBF0DD3B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBC8B78D-1131-4F21-919D-8AC79A410FB9\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BBCD86A-E6C7-4444-9D74-F861084090F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.\"}, {\"lang\": \"es\", \"value\": \"Una aplicaci\\u00f3n insuficiente de la pol\\u00edtica en Blink en Google Chrome versiones anteriores a 80.0.3987.87, permiti\\u00f3 a un atacante remoto omitir la pol\\u00edtica de seguridad de contenido por medio de una p\\u00e1gina HTML dise\\u00f1ada.\"}]",
"id": "CVE-2020-6394",
"lastModified": "2024-11-21T05:35:38.470",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.5}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2020-02-11T15:15:12.880",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0514\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1014371\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/\", \"source\": \"chrome-cve-admin@google.com\"}, {\"url\": \"https://security.gentoo.org/glsa/202003-08\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2020/dsa-4638\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2020:0514\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://crbug.com/1014371\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202003-08\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2020/dsa-4638\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-6394\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2020-02-11T15:15:12.880\",\"lastModified\":\"2024-11-21T05:35:38.470\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.\"},{\"lang\":\"es\",\"value\":\"Una aplicaci\u00f3n insuficiente de la pol\u00edtica en Blink en Google Chrome versiones anteriores a 80.0.3987.87, permiti\u00f3 a un atacante remoto omitir la pol\u00edtica de seguridad de contenido por medio de una p\u00e1gina HTML dise\u00f1ada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"80.0.3987.87\",\"matchCriteriaId\":\"330F53AF-8692-40A0-B0F5-347B2F7E8A88\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"40513095-7E6E-46B3-B604-C926F1BA3568\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"284A8DA0-317B-4BBE-AECB-7E91BBF0DD3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBC8B78D-1131-4F21-919D-8AC79A410FB9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0514\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1014371\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://security.gentoo.org/glsa/202003-08\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4638\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0514\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://crbug.com/1014371\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202003-08\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4638\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2020-AVI-072
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 80.0.3987.87",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-6412",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6412"
},
{
"name": "CVE-2020-6409",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6409"
},
{
"name": "CVE-2020-6385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6385"
},
{
"name": "CVE-2020-6411",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6411"
},
{
"name": "CVE-2020-6391",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6391"
},
{
"name": "CVE-2020-6396",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6396"
},
{
"name": "CVE-2020-6408",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6408"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2020-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6387"
},
{
"name": "CVE-2020-6415",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6415"
},
{
"name": "CVE-2020-6392",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6392"
},
{
"name": "CVE-2020-6404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6404"
},
{
"name": "CVE-2020-6406",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6406"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2020-6399",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6399"
},
{
"name": "CVE-2020-6394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6394"
},
{
"name": "CVE-2020-6413",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6413"
},
{
"name": "CVE-2020-6414",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6414"
},
{
"name": "CVE-2020-6398",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6398"
},
{
"name": "CVE-2020-6417",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6417"
},
{
"name": "CVE-2020-6402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6402"
},
{
"name": "CVE-2020-6403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6403"
},
{
"name": "CVE-2020-6416",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6416"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2020-6390",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6390"
},
{
"name": "CVE-2020-6388",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6388"
},
{
"name": "CVE-2020-6389",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6389"
},
{
"name": "CVE-2020-6405",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6405"
},
{
"name": "CVE-2020-6400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6400"
},
{
"name": "CVE-2020-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6395"
},
{
"name": "CVE-2020-6381",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6381"
},
{
"name": "CVE-2020-6410",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6410"
},
{
"name": "CVE-2020-6393",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6393"
},
{
"name": "CVE-2019-18197",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18197"
},
{
"name": "CVE-2020-6382",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6382"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2020-6397",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6397"
},
{
"name": "CVE-2020-6401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6401"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-072",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-02-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 04 f\u00e9vrier 2020",
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
}
]
}
CERTFR-2020-AVI-072
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Chrome. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Chrome versions ant\u00e9rieures \u00e0 80.0.3987.87",
"product": {
"name": "Chrome",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-6412",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6412"
},
{
"name": "CVE-2020-6409",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6409"
},
{
"name": "CVE-2020-6385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6385"
},
{
"name": "CVE-2020-6411",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6411"
},
{
"name": "CVE-2020-6391",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6391"
},
{
"name": "CVE-2020-6396",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6396"
},
{
"name": "CVE-2020-6408",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6408"
},
{
"name": "CVE-2019-19926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
},
{
"name": "CVE-2020-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6387"
},
{
"name": "CVE-2020-6415",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6415"
},
{
"name": "CVE-2020-6392",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6392"
},
{
"name": "CVE-2020-6404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6404"
},
{
"name": "CVE-2020-6406",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6406"
},
{
"name": "CVE-2019-19925",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
},
{
"name": "CVE-2020-6399",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6399"
},
{
"name": "CVE-2020-6394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6394"
},
{
"name": "CVE-2020-6413",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6413"
},
{
"name": "CVE-2020-6414",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6414"
},
{
"name": "CVE-2020-6398",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6398"
},
{
"name": "CVE-2020-6417",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6417"
},
{
"name": "CVE-2020-6402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6402"
},
{
"name": "CVE-2020-6403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6403"
},
{
"name": "CVE-2020-6416",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6416"
},
{
"name": "CVE-2019-19880",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
},
{
"name": "CVE-2020-6390",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6390"
},
{
"name": "CVE-2020-6388",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6388"
},
{
"name": "CVE-2020-6389",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6389"
},
{
"name": "CVE-2020-6405",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6405"
},
{
"name": "CVE-2020-6400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6400"
},
{
"name": "CVE-2020-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6395"
},
{
"name": "CVE-2020-6381",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6381"
},
{
"name": "CVE-2020-6410",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6410"
},
{
"name": "CVE-2020-6393",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6393"
},
{
"name": "CVE-2019-18197",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18197"
},
{
"name": "CVE-2020-6382",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6382"
},
{
"name": "CVE-2019-19923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
},
{
"name": "CVE-2020-6397",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6397"
},
{
"name": "CVE-2020-6401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6401"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-072",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-02-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Chrome.\nElles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Chrome",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 04 f\u00e9vrier 2020",
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
}
]
}
BDU:2020-01476
Vulnerability from fstec - Published: 11.02.2020{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Red Hat Inc., Novell Inc., Fedora Project, Google Inc, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "16.04 LTS (Ubuntu), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), Desktop 6.0 (Red Hat Enterprise Linux), Server 6.0 (Red Hat Enterprise Linux), Workstation 6.0 (Red Hat Enterprise Linux), 15.1 (OpenSUSE Leap), 30 (Fedora), 12 SP3 (SUSE Package Hub for SUSE Linux Enterprise), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 31 (Fedora), 12 (SUSE Package Hub for SUSE Linux Enterprise), \u0434\u043e 80.0.3987.87 (Google Chrome), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418c\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f chromium:\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 80.0.3987.87 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\n\n\u0414\u043b\u044f Debian GNU/Linux:\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 chromium) \u0434\u043e 80.0.3987.87 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Astra Linux:\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=71831011\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/es-es/security/cve/CVE-2020-6394/\nhttps://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html\nhttps://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/errata/RHSA-2020:0514\n\n\u0414\u043b\u044f Ubuntu:\nhttps://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-6394.html\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f chromium \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 105.0.5195.125+repack2-1~deb11u1.osnova1.strelets\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "11.02.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "14.04.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-01476",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-6394",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ubuntu, Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Enterprise Linux, OpenSUSE Leap, Fedora, SUSE Package Hub for SUSE Linux Enterprise, Google Chrome, \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Canonical Ltd. Ubuntu 16.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Inc. Red Hat Enterprise Linux Desktop 6.0 , Red Hat Inc. Red Hat Enterprise Linux Server 6.0 , Red Hat Inc. Red Hat Enterprise Linux Workstation 6.0 , Novell Inc. OpenSUSE Leap 15.1 , Fedora Project Fedora 30 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Fedora Project Fedora 31 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0435\u0435 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0435\u0435 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0439 HTML-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-6394\n\nhttps://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html\nhttps://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html\nhttps://www.suse.com/security/cve/CVE-2020-6394/\nhttps://www.debian.org/security/2020/dsa-4638\nhttps://access.redhat.com/errata/RHSA-2020:0514\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=71831011\nhttps://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-6394.html\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023\nhttps://crbug.com/1014371\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,4)"
}
CNVD-2020-10255
Vulnerability from cnvd - Published: 2020-02-19厂商已发布了漏洞修复程序,请及时关注更新: https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
| Name | Google Chrome <80.0.3987.87 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-6394",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-6394"
}
},
"description": "Chrome\u662f\u7531Google\u5f00\u53d1\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5de5\u5177\u3002\n\nGoogle Chrome 80.0.3987.87\u4e4b\u524d\u7248\u672c\u5b58\u5728\u5185\u5bb9\u5b89\u5168\u7b56\u7565\u7ed5\u8fc7\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8eChrome\u4e2d\u7684Blink\u7684\u7b56\u7565\u6267\u884c\u4e0d\u8db3\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7279\u5236HTML\u9875\u9762\u7ed5\u8fc7\u5185\u5bb9\u5b89\u5168\u7b56\u7565\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-10255",
"openTime": "2020-02-19",
"patchDescription": "Chrome\u662f\u7531Google\u5f00\u53d1\u7684\u4e00\u6b3eWeb\u6d4f\u89c8\u5de5\u5177\u3002\r\n\r\nGoogle Chrome 80.0.3987.87\u4e4b\u524d\u7248\u672c\u5b58\u5728\u5185\u5bb9\u5b89\u5168\u7b56\u7565\u7ed5\u8fc7\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8eChrome\u4e2d\u7684Blink\u7684\u7b56\u7565\u6267\u884c\u4e0d\u8db3\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u7279\u5236HTML\u9875\u9762\u7ed5\u8fc7\u5185\u5bb9\u5b89\u5168\u7b56\u7565\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Chrome\u5185\u5bb9\u5b89\u5168\u7b56\u7565\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2020-10255\uff09\u7684\u8865\u4e01",
"products": {
"product": "Google Chrome \u003c80.0.3987.87"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-6394",
"serverity": "\u4e2d",
"submitTime": "2020-02-17",
"title": "Google Chrome\u5185\u5bb9\u5b89\u5168\u7b56\u7565\u7ed5\u8fc7\u6f0f\u6d1e\uff08CNVD-2020-10255\uff09"
}
FKIE_CVE-2020-6394
Vulnerability from fkie_nvd - Published: 2020-02-11 15:15 - Updated: 2024-11-21 05:35| Vendor | Product | Version | |
|---|---|---|---|
| chrome | * | ||
| opensuse | backports_sle | 15.0 | |
| fedoraproject | fedora | 30 | |
| fedoraproject | fedora | 31 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| suse | package_hub | - | |
| suse | linux_enterprise | 12.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_workstation | 6.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"matchCriteriaId": "330F53AF-8692-40A0-B0F5-347B2F7E8A88",
"versionEndExcluding": "80.0.3987.87",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*",
"matchCriteriaId": "284A8DA0-317B-4BBE-AECB-7E91BBF0DD3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC8B78D-1131-4F21-919D-8AC79A410FB9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page."
},
{
"lang": "es",
"value": "Una aplicaci\u00f3n insuficiente de la pol\u00edtica en Blink en Google Chrome versiones anteriores a 80.0.3987.87, permiti\u00f3 a un atacante remoto omitir la pol\u00edtica de seguridad de contenido por medio de una p\u00e1gina HTML dise\u00f1ada."
}
],
"id": "CVE-2020-6394",
"lastModified": "2024-11-21T05:35:38.470",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-02-11T15:15:12.880",
"references": [
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0514"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://crbug.com/1014371"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/"
},
{
"source": "chrome-cve-admin@google.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-08"
},
{
"source": "chrome-cve-admin@google.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4638"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0514"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://crbug.com/1014371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-08"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4638"
}
],
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-WCQQ-QGQ5-G383
Vulnerability from github – Published: 2022-05-24 17:08 – Updated: 2022-05-24 17:08Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.
{
"affected": [],
"aliases": [
"CVE-2020-6394"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-02-11T15:15:00Z",
"severity": "MODERATE"
},
"details": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"id": "GHSA-wcqq-qgq5-g383",
"modified": "2022-05-24T17:08:40Z",
"published": "2022-05-24T17:08:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6394"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0514"
},
{
"type": "WEB",
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
},
{
"type": "WEB",
"url": "https://crbug.com/1014371"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202003-08"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2020/dsa-4638"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2020-6394
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-6394",
"description": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"id": "GSD-2020-6394",
"references": [
"https://www.suse.com/security/cve/CVE-2020-6394.html",
"https://www.debian.org/security/2020/dsa-4638",
"https://access.redhat.com/errata/RHSA-2020:0514",
"https://advisories.mageia.org/CVE-2020-6394.html",
"https://security.archlinux.org/CVE-2020-6394"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-6394"
],
"details": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"id": "GSD-2020-6394",
"modified": "2023-12-13T01:21:55.305936Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2020-6394",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Chrome",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "80.0.3987.87"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficient policy enforcement"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
},
{
"name": "https://crbug.com/1014371",
"refsource": "MISC",
"url": "https://crbug.com/1014371"
},
{
"name": "openSUSE-SU-2020:0210",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html"
},
{
"name": "RHSA-2020:0514",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0514"
},
{
"name": "openSUSE-SU-2020:0233",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html"
},
{
"name": "DSA-4638",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2020/dsa-4638"
},
{
"name": "GLSA-202003-08",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202003-08"
},
{
"name": "FEDORA-2020-f6271d7afa",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/"
},
{
"name": "FEDORA-2020-39e0b8bd14",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "80.0.3987.87",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2020-6394"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://crbug.com/1014371",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://crbug.com/1014371"
},
{
"name": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html"
},
{
"name": "openSUSE-SU-2020:0210",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html"
},
{
"name": "RHSA-2020:0514",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0514"
},
{
"name": "openSUSE-SU-2020:0233",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html"
},
{
"name": "DSA-4638",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4638"
},
{
"name": "GLSA-202003-08",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-08"
},
{
"name": "FEDORA-2020-f6271d7afa",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/"
},
{
"name": "FEDORA-2020-39e0b8bd14",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
},
"lastModifiedDate": "2022-04-06T17:54Z",
"publishedDate": "2020-02-11T15:15Z"
}
}
}
OPENSUSE-SU-2020:0189-1
Vulnerability from csaf_opensuse - Published: 2020-02-08 23:11 - Updated: 2020-02-08 23:11| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium was updated to version 80.0.3987.87 (boo#1162833).\n\nSecurity issues fixed:\n\n- CVE-2020-6381: Integer overflow in JavaScript (boo#1162833).\n- CVE-2020-6382: Type Confusion in JavaScript (boo#1162833).\n- CVE-2019-18197: Multiple vulnerabilities in XML (boo#1162833).\n- CVE-2019-19926: Inappropriate implementation in SQLite (boo#1162833).\n- CVE-2020-6385: Insufficient policy enforcement in storage (boo#1162833).\n- CVE-2019-19880, CVE-2019-19925: Multiple vulnerabilities in SQLite (boo#1162833).\n- CVE-2020-6387: Out of bounds write in WebRTC (boo#1162833).\n- CVE-2020-6388: Out of bounds memory access in WebAudio (boo#1162833).\n- CVE-2020-6389: Out of bounds write in WebRTC (boo#1162833).\n- CVE-2020-6390: Out of bounds memory access in streams (boo#1162833).\n- CVE-2020-6391: Insufficient validation of untrusted input in Blink (boo#1162833).\n- CVE-2020-6392: Insufficient policy enforcement in extensions (boo#1162833).\n- CVE-2020-6393: Insufficient policy enforcement in Blink (boo#1162833).\n- CVE-2020-6394: Insufficient policy enforcement in Blink (boo#1162833).\n- CVE-2020-6395: Out of bounds read in JavaScript (boo#1162833).\n- CVE-2020-6396: Inappropriate implementation in Skia (boo#1162833).\n- CVE-2020-6397: Incorrect security UI in sharing (boo#1162833).\n- CVE-2020-6398: Uninitialized use in PDFium (boo#1162833).\n- CVE-2020-6399: Insufficient policy enforcement in AppCache (boo#1162833).\n- CVE-2020-6400: Inappropriate implementation in CORS (boo#1162833).\n- CVE-2020-6401: Insufficient validation of untrusted input in Omnibox (boo#1162833).\n- CVE-2020-6402: Insufficient policy enforcement in downloads (boo#1162833).\n- CVE-2020-6403: Incorrect security UI in Omnibox (boo#1162833).\n- CVE-2020-6404: Inappropriate implementation in Blink (boo#1162833).\n- CVE-2020-6405: Out of bounds read in SQLite (boo#1162833).\n- CVE-2020-6406: Use after free in audio (boo#1162833).\n- CVE-2019-19923: Out of bounds memory access in SQLite (boo#1162833).\n- CVE-2020-6408: Insufficient policy enforcement in CORS (boo#1162833).\n- CVE-2020-6409: Inappropriate implementation in Omnibox (boo#1162833).\n- CVE-2020-6410: Insufficient policy enforcement in navigation (boo#1162833).\n- CVE-2020-6411: Insufficient validation of untrusted input in Omnibox (boo#1162833).\n- CVE-2020-6412: Insufficient validation of untrusted input in Omnibox (boo#1162833).\n- CVE-2020-6413: Inappropriate implementation in Blink (boo#1162833).\n- CVE-2020-6414: Insufficient policy enforcement in Safe Browsing (boo#1162833).\n- CVE-2020-6415: Inappropriate implementation in JavaScript (boo#1162833).\n- CVE-2020-6416: Insufficient data validation in streams (boo#1162833).\n- CVE-2020-6417: Inappropriate implementation in installer (boo#1162833).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-189",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0189-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0189-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVRYLRPQE3DA7JXQF45EVKRHJ433WYL/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0189-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVRYLRPQE3DA7JXQF45EVKRHJ433WYL/"
},
{
"category": "self",
"summary": "SUSE Bug 1162833",
"url": "https://bugzilla.suse.com/1162833"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18197 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19880 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19923 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19925 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19925/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19926 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6381 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6382 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6387 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6388 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6389 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6390 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6391 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6392 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6393 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6394 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6395 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6396 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6396/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6397 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6397/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6398 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6399 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6400 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6400/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6401 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6402 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6403 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6404 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6405 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6406 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6408 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6409 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6410 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6411 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6411/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6412 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6412/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6413 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6414 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6414/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6415 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6416 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6417 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6417/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2020-02-08T23:11:40Z",
"generator": {
"date": "2020-02-08T23:11:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0189-1",
"initial_release_date": "2020-02-08T23:11:40Z",
"revision_history": [
{
"date": "2020-02-08T23:11:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"product": {
"name": "chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"product_id": "chromedriver-80.0.3987.87-lp151.2.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-80.0.3987.87-lp151.2.63.1.x86_64",
"product": {
"name": "chromium-80.0.3987.87-lp151.2.63.1.x86_64",
"product_id": "chromium-80.0.3987.87-lp151.2.63.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-80.0.3987.87-lp151.2.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64"
},
"product_reference": "chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-80.0.3987.87-lp151.2.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
},
"product_reference": "chromium-80.0.3987.87-lp151.2.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18197"
}
],
"notes": [
{
"category": "general",
"text": "In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn\u0027t reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18197",
"url": "https://www.suse.com/security/cve/CVE-2019-18197"
},
{
"category": "external",
"summary": "SUSE Bug 1154609 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1154609"
},
{
"category": "external",
"summary": "SUSE Bug 1157028 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1157028"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1162833"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1190108 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1190108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2019-18197"
},
{
"cve": "CVE-2019-19880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19880"
}
],
"notes": [
{
"category": "general",
"text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19880",
"url": "https://www.suse.com/security/cve/CVE-2019-19880"
},
{
"category": "external",
"summary": "SUSE Bug 1159491 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1159491"
},
{
"category": "external",
"summary": "SUSE Bug 1159715 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1159715"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2019-19880"
},
{
"cve": "CVE-2019-19923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19923"
}
],
"notes": [
{
"category": "general",
"text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19923",
"url": "https://www.suse.com/security/cve/CVE-2019-19923"
},
{
"category": "external",
"summary": "SUSE Bug 1160309 for CVE-2019-19923",
"url": "https://bugzilla.suse.com/1160309"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19923",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "moderate"
}
],
"title": "CVE-2019-19923"
},
{
"cve": "CVE-2019-19925",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19925"
}
],
"notes": [
{
"category": "general",
"text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19925",
"url": "https://www.suse.com/security/cve/CVE-2019-19925"
},
{
"category": "external",
"summary": "SUSE Bug 1159847 for CVE-2019-19925",
"url": "https://bugzilla.suse.com/1159847"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19925",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "low"
}
],
"title": "CVE-2019-19925"
},
{
"cve": "CVE-2019-19926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19926"
}
],
"notes": [
{
"category": "general",
"text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19926",
"url": "https://www.suse.com/security/cve/CVE-2019-19926"
},
{
"category": "external",
"summary": "SUSE Bug 1159491 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1159491"
},
{
"category": "external",
"summary": "SUSE Bug 1159715 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1159715"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2019-19926"
},
{
"cve": "CVE-2020-6381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6381"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6381",
"url": "https://www.suse.com/security/cve/CVE-2020-6381"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6381",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6381"
},
{
"cve": "CVE-2020-6382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6382"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6382",
"url": "https://www.suse.com/security/cve/CVE-2020-6382"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6382",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6382"
},
{
"cve": "CVE-2020-6385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6385"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6385",
"url": "https://www.suse.com/security/cve/CVE-2020-6385"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6385",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6385"
},
{
"cve": "CVE-2020-6387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6387"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6387",
"url": "https://www.suse.com/security/cve/CVE-2020-6387"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6387",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6387"
},
{
"cve": "CVE-2020-6388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6388"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6388",
"url": "https://www.suse.com/security/cve/CVE-2020-6388"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6388",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6388"
},
{
"cve": "CVE-2020-6389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6389"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6389",
"url": "https://www.suse.com/security/cve/CVE-2020-6389"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6389",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6389"
},
{
"cve": "CVE-2020-6390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6390"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6390",
"url": "https://www.suse.com/security/cve/CVE-2020-6390"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6390",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6390"
},
{
"cve": "CVE-2020-6391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6391"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6391",
"url": "https://www.suse.com/security/cve/CVE-2020-6391"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6391",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6391"
},
{
"cve": "CVE-2020-6392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6392"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6392",
"url": "https://www.suse.com/security/cve/CVE-2020-6392"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6392",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6392"
},
{
"cve": "CVE-2020-6393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6393"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6393",
"url": "https://www.suse.com/security/cve/CVE-2020-6393"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6393",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6393"
},
{
"cve": "CVE-2020-6394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6394"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6394",
"url": "https://www.suse.com/security/cve/CVE-2020-6394"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6394",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6394"
},
{
"cve": "CVE-2020-6395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6395"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6395",
"url": "https://www.suse.com/security/cve/CVE-2020-6395"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6395",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6395"
},
{
"cve": "CVE-2020-6396",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6396"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6396",
"url": "https://www.suse.com/security/cve/CVE-2020-6396"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6396",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6396"
},
{
"cve": "CVE-2020-6397",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6397"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6397",
"url": "https://www.suse.com/security/cve/CVE-2020-6397"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6397",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6397"
},
{
"cve": "CVE-2020-6398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6398"
}
],
"notes": [
{
"category": "general",
"text": "Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6398",
"url": "https://www.suse.com/security/cve/CVE-2020-6398"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6398",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6398"
},
{
"cve": "CVE-2020-6399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6399"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6399",
"url": "https://www.suse.com/security/cve/CVE-2020-6399"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6399",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6399"
},
{
"cve": "CVE-2020-6400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6400"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6400",
"url": "https://www.suse.com/security/cve/CVE-2020-6400"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6400",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6400"
},
{
"cve": "CVE-2020-6401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6401"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6401",
"url": "https://www.suse.com/security/cve/CVE-2020-6401"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6401",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6401"
},
{
"cve": "CVE-2020-6402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6402"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6402",
"url": "https://www.suse.com/security/cve/CVE-2020-6402"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6402",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6402"
},
{
"cve": "CVE-2020-6403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6403"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6403",
"url": "https://www.suse.com/security/cve/CVE-2020-6403"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6403",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6403"
},
{
"cve": "CVE-2020-6404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6404"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6404",
"url": "https://www.suse.com/security/cve/CVE-2020-6404"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6404",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6404"
},
{
"cve": "CVE-2020-6405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6405"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6405",
"url": "https://www.suse.com/security/cve/CVE-2020-6405"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6405",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6405"
},
{
"cve": "CVE-2020-6406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6406"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6406",
"url": "https://www.suse.com/security/cve/CVE-2020-6406"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6406",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6406"
},
{
"cve": "CVE-2020-6408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6408"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6408",
"url": "https://www.suse.com/security/cve/CVE-2020-6408"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6408",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6408"
},
{
"cve": "CVE-2020-6409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6409"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6409",
"url": "https://www.suse.com/security/cve/CVE-2020-6409"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6409",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6409"
},
{
"cve": "CVE-2020-6410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6410"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6410",
"url": "https://www.suse.com/security/cve/CVE-2020-6410"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6410",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6410"
},
{
"cve": "CVE-2020-6411",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6411"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6411",
"url": "https://www.suse.com/security/cve/CVE-2020-6411"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6411",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6411"
},
{
"cve": "CVE-2020-6412",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6412"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6412",
"url": "https://www.suse.com/security/cve/CVE-2020-6412"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6412",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6412"
},
{
"cve": "CVE-2020-6413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6413"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6413",
"url": "https://www.suse.com/security/cve/CVE-2020-6413"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6413",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6413"
},
{
"cve": "CVE-2020-6414",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6414"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6414",
"url": "https://www.suse.com/security/cve/CVE-2020-6414"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6414",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6414"
},
{
"cve": "CVE-2020-6415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6415"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6415",
"url": "https://www.suse.com/security/cve/CVE-2020-6415"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6415",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6415"
},
{
"cve": "CVE-2020-6416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6416"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6416",
"url": "https://www.suse.com/security/cve/CVE-2020-6416"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6416",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6416"
},
{
"cve": "CVE-2020-6417",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6417"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6417",
"url": "https://www.suse.com/security/cve/CVE-2020-6417"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6417",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:chromedriver-80.0.3987.87-lp151.2.63.1.x86_64",
"openSUSE Leap 15.1:chromium-80.0.3987.87-lp151.2.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-08T23:11:40Z",
"details": "important"
}
],
"title": "CVE-2020-6417"
}
]
}
OPENSUSE-SU-2020:0210-1
Vulnerability from csaf_opensuse - Published: 2020-02-12 05:12 - Updated: 2020-02-12 05:12| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium fixes the following issues:\n\nChromium was updated to version 80.0.3987.87 (boo#1162833).\n\nSecurity issues fixed:\n\n- CVE-2020-6381: Integer overflow in JavaScript (boo#1162833).\n- CVE-2020-6382: Type Confusion in JavaScript (boo#1162833).\n- CVE-2019-18197: Multiple vulnerabilities in XML (boo#1162833).\n- CVE-2019-19926: Inappropriate implementation in SQLite (boo#1162833).\n- CVE-2020-6385: Insufficient policy enforcement in storage (boo#1162833).\n- CVE-2019-19880, CVE-2019-19925: Multiple vulnerabilities in SQLite (boo#1162833).\n- CVE-2020-6387: Out of bounds write in WebRTC (boo#1162833).\n- CVE-2020-6388: Out of bounds memory access in WebAudio (boo#1162833).\n- CVE-2020-6389: Out of bounds write in WebRTC (boo#1162833).\n- CVE-2020-6390: Out of bounds memory access in streams (boo#1162833).\n- CVE-2020-6391: Insufficient validation of untrusted input in Blink (boo#1162833).\n- CVE-2020-6392: Insufficient policy enforcement in extensions (boo#1162833).\n- CVE-2020-6393: Insufficient policy enforcement in Blink (boo#1162833).\n- CVE-2020-6394: Insufficient policy enforcement in Blink (boo#1162833).\n- CVE-2020-6395: Out of bounds read in JavaScript (boo#1162833).\n- CVE-2020-6396: Inappropriate implementation in Skia (boo#1162833).\n- CVE-2020-6397: Incorrect security UI in sharing (boo#1162833).\n- CVE-2020-6398: Uninitialized use in PDFium (boo#1162833).\n- CVE-2020-6399: Insufficient policy enforcement in AppCache (boo#1162833).\n- CVE-2020-6400: Inappropriate implementation in CORS (boo#1162833).\n- CVE-2020-6401: Insufficient validation of untrusted input in Omnibox (boo#1162833).\n- CVE-2020-6402: Insufficient policy enforcement in downloads (boo#1162833).\n- CVE-2020-6403: Incorrect security UI in Omnibox (boo#1162833).\n- CVE-2020-6404: Inappropriate implementation in Blink (boo#1162833).\n- CVE-2020-6405: Out of bounds read in SQLite (boo#1162833).\n- CVE-2020-6406: Use after free in audio (boo#1162833).\n- CVE-2019-19923: Out of bounds memory access in SQLite (boo#1162833).\n- CVE-2020-6408: Insufficient policy enforcement in CORS (boo#1162833).\n- CVE-2020-6409: Inappropriate implementation in Omnibox (boo#1162833).\n- CVE-2020-6410: Insufficient policy enforcement in navigation (boo#1162833).\n- CVE-2020-6411: Insufficient validation of untrusted input in Omnibox (boo#1162833).\n- CVE-2020-6412: Insufficient validation of untrusted input in Omnibox (boo#1162833).\n- CVE-2020-6413: Inappropriate implementation in Blink (boo#1162833).\n- CVE-2020-6414: Insufficient policy enforcement in Safe Browsing (boo#1162833).\n- CVE-2020-6415: Inappropriate implementation in JavaScript (boo#1162833).\n- CVE-2020-6416: Insufficient data validation in streams (boo#1162833).\n- CVE-2020-6417: Inappropriate implementation in installer (boo#1162833).\n\nThis update was imported from the openSUSE:Leap:15.1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-210",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0210-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0210-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAOUMLFZMVYH6TYWJSSQ6OXQGLVPDPJ6/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0210-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAOUMLFZMVYH6TYWJSSQ6OXQGLVPDPJ6/"
},
{
"category": "self",
"summary": "SUSE Bug 1162833",
"url": "https://bugzilla.suse.com/1162833"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18197 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19880 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19923 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19925 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19925/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19926 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6381 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6382 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6387 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6388 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6389 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6390 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6391 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6392 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6393 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6394 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6395 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6396 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6396/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6397 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6397/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6398 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6399 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6400 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6400/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6401 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6402 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6403 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6404 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6405 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6406 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6408 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6409 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6410 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6411 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6411/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6412 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6412/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6413 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6414 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6414/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6415 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6416 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6417 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6417/"
}
],
"title": "Security update for chromium",
"tracking": {
"current_release_date": "2020-02-12T05:12:32Z",
"generator": {
"date": "2020-02-12T05:12:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0210-1",
"initial_release_date": "2020-02-12T05:12:32Z",
"revision_history": [
{
"date": "2020-02-12T05:12:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"product": {
"name": "chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"product_id": "chromedriver-80.0.3987.87-bp151.3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"product": {
"name": "chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"product_id": "chromium-80.0.3987.87-bp151.3.59.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"product": {
"name": "chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"product_id": "chromedriver-80.0.3987.87-bp151.3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-80.0.3987.87-bp151.3.59.1.x86_64",
"product": {
"name": "chromium-80.0.3987.87-bp151.3.59.1.x86_64",
"product_id": "chromium-80.0.3987.87-bp151.3.59.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP1",
"product": {
"name": "SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-80.0.3987.87-bp151.3.59.1.aarch64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64"
},
"product_reference": "chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-80.0.3987.87-bp151.3.59.1.x86_64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64"
},
"product_reference": "chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-80.0.3987.87-bp151.3.59.1.aarch64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64"
},
"product_reference": "chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-80.0.3987.87-bp151.3.59.1.x86_64 as component of SUSE Package Hub 15 SP1",
"product_id": "SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
},
"product_reference": "chromium-80.0.3987.87-bp151.3.59.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18197"
}
],
"notes": [
{
"category": "general",
"text": "In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn\u0027t reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18197",
"url": "https://www.suse.com/security/cve/CVE-2019-18197"
},
{
"category": "external",
"summary": "SUSE Bug 1154609 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1154609"
},
{
"category": "external",
"summary": "SUSE Bug 1157028 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1157028"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1162833"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1190108 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1190108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2019-18197"
},
{
"cve": "CVE-2019-19880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19880"
}
],
"notes": [
{
"category": "general",
"text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19880",
"url": "https://www.suse.com/security/cve/CVE-2019-19880"
},
{
"category": "external",
"summary": "SUSE Bug 1159491 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1159491"
},
{
"category": "external",
"summary": "SUSE Bug 1159715 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1159715"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2019-19880"
},
{
"cve": "CVE-2019-19923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19923"
}
],
"notes": [
{
"category": "general",
"text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19923",
"url": "https://www.suse.com/security/cve/CVE-2019-19923"
},
{
"category": "external",
"summary": "SUSE Bug 1160309 for CVE-2019-19923",
"url": "https://bugzilla.suse.com/1160309"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19923",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "moderate"
}
],
"title": "CVE-2019-19923"
},
{
"cve": "CVE-2019-19925",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19925"
}
],
"notes": [
{
"category": "general",
"text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19925",
"url": "https://www.suse.com/security/cve/CVE-2019-19925"
},
{
"category": "external",
"summary": "SUSE Bug 1159847 for CVE-2019-19925",
"url": "https://bugzilla.suse.com/1159847"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19925",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "low"
}
],
"title": "CVE-2019-19925"
},
{
"cve": "CVE-2019-19926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19926"
}
],
"notes": [
{
"category": "general",
"text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19926",
"url": "https://www.suse.com/security/cve/CVE-2019-19926"
},
{
"category": "external",
"summary": "SUSE Bug 1159491 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1159491"
},
{
"category": "external",
"summary": "SUSE Bug 1159715 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1159715"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2019-19926"
},
{
"cve": "CVE-2020-6381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6381"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6381",
"url": "https://www.suse.com/security/cve/CVE-2020-6381"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6381",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6381"
},
{
"cve": "CVE-2020-6382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6382"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6382",
"url": "https://www.suse.com/security/cve/CVE-2020-6382"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6382",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6382"
},
{
"cve": "CVE-2020-6385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6385"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6385",
"url": "https://www.suse.com/security/cve/CVE-2020-6385"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6385",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6385"
},
{
"cve": "CVE-2020-6387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6387"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6387",
"url": "https://www.suse.com/security/cve/CVE-2020-6387"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6387",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6387"
},
{
"cve": "CVE-2020-6388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6388"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6388",
"url": "https://www.suse.com/security/cve/CVE-2020-6388"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6388",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6388"
},
{
"cve": "CVE-2020-6389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6389"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6389",
"url": "https://www.suse.com/security/cve/CVE-2020-6389"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6389",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6389"
},
{
"cve": "CVE-2020-6390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6390"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6390",
"url": "https://www.suse.com/security/cve/CVE-2020-6390"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6390",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6390"
},
{
"cve": "CVE-2020-6391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6391"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6391",
"url": "https://www.suse.com/security/cve/CVE-2020-6391"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6391",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6391"
},
{
"cve": "CVE-2020-6392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6392"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6392",
"url": "https://www.suse.com/security/cve/CVE-2020-6392"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6392",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6392"
},
{
"cve": "CVE-2020-6393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6393"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6393",
"url": "https://www.suse.com/security/cve/CVE-2020-6393"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6393",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6393"
},
{
"cve": "CVE-2020-6394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6394"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6394",
"url": "https://www.suse.com/security/cve/CVE-2020-6394"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6394",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6394"
},
{
"cve": "CVE-2020-6395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6395"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6395",
"url": "https://www.suse.com/security/cve/CVE-2020-6395"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6395",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6395"
},
{
"cve": "CVE-2020-6396",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6396"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6396",
"url": "https://www.suse.com/security/cve/CVE-2020-6396"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6396",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6396"
},
{
"cve": "CVE-2020-6397",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6397"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6397",
"url": "https://www.suse.com/security/cve/CVE-2020-6397"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6397",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6397"
},
{
"cve": "CVE-2020-6398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6398"
}
],
"notes": [
{
"category": "general",
"text": "Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6398",
"url": "https://www.suse.com/security/cve/CVE-2020-6398"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6398",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6398"
},
{
"cve": "CVE-2020-6399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6399"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6399",
"url": "https://www.suse.com/security/cve/CVE-2020-6399"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6399",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6399"
},
{
"cve": "CVE-2020-6400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6400"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6400",
"url": "https://www.suse.com/security/cve/CVE-2020-6400"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6400",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6400"
},
{
"cve": "CVE-2020-6401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6401"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6401",
"url": "https://www.suse.com/security/cve/CVE-2020-6401"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6401",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6401"
},
{
"cve": "CVE-2020-6402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6402"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6402",
"url": "https://www.suse.com/security/cve/CVE-2020-6402"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6402",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6402"
},
{
"cve": "CVE-2020-6403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6403"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6403",
"url": "https://www.suse.com/security/cve/CVE-2020-6403"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6403",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6403"
},
{
"cve": "CVE-2020-6404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6404"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6404",
"url": "https://www.suse.com/security/cve/CVE-2020-6404"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6404",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6404"
},
{
"cve": "CVE-2020-6405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6405"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6405",
"url": "https://www.suse.com/security/cve/CVE-2020-6405"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6405",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6405"
},
{
"cve": "CVE-2020-6406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6406"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6406",
"url": "https://www.suse.com/security/cve/CVE-2020-6406"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6406",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6406"
},
{
"cve": "CVE-2020-6408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6408"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6408",
"url": "https://www.suse.com/security/cve/CVE-2020-6408"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6408",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6408"
},
{
"cve": "CVE-2020-6409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6409"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6409",
"url": "https://www.suse.com/security/cve/CVE-2020-6409"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6409",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6409"
},
{
"cve": "CVE-2020-6410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6410"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6410",
"url": "https://www.suse.com/security/cve/CVE-2020-6410"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6410",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6410"
},
{
"cve": "CVE-2020-6411",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6411"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6411",
"url": "https://www.suse.com/security/cve/CVE-2020-6411"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6411",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6411"
},
{
"cve": "CVE-2020-6412",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6412"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6412",
"url": "https://www.suse.com/security/cve/CVE-2020-6412"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6412",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6412"
},
{
"cve": "CVE-2020-6413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6413"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6413",
"url": "https://www.suse.com/security/cve/CVE-2020-6413"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6413",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6413"
},
{
"cve": "CVE-2020-6414",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6414"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6414",
"url": "https://www.suse.com/security/cve/CVE-2020-6414"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6414",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6414"
},
{
"cve": "CVE-2020-6415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6415"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6415",
"url": "https://www.suse.com/security/cve/CVE-2020-6415"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6415",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6415"
},
{
"cve": "CVE-2020-6416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6416"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6416",
"url": "https://www.suse.com/security/cve/CVE-2020-6416"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6416",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6416"
},
{
"cve": "CVE-2020-6417",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6417"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6417",
"url": "https://www.suse.com/security/cve/CVE-2020-6417"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6417",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromedriver-80.0.3987.87-bp151.3.59.1.x86_64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.aarch64",
"SUSE Package Hub 15 SP1:chromium-80.0.3987.87-bp151.3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-12T05:12:32Z",
"details": "important"
}
],
"title": "CVE-2020-6417"
}
]
}
OPENSUSE-SU-2020:0233-1
Vulnerability from csaf_opensuse - Published: 2020-02-19 09:14 - Updated: 2020-02-19 09:14| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for chromium, re2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for chromium, re2 fixes the following issues:\n\n- Update to 80.0.3987.87 boo#1162833:\n * CVE-2020-6381: Integer overflow in JavaScript\n * CVE-2020-6382: Type Confusion in JavaScript\n * CVE-2019-18197: Multiple vulnerabilities in XML\n * CVE-2019-19926: Inappropriate implementation in SQLite\n * CVE-2020-6385: Insufficient policy enforcement in storage\n * CVE-2019-19880, CVE-2019-19925: Multiple vulnerabilities in SQLite\n * CVE-2020-6387: Out of bounds write in WebRTC\n * CVE-2020-6388: Out of bounds memory access in WebAudio\n * CVE-2020-6389: Out of bounds write in WebRTC\n * CVE-2020-6390: Out of bounds memory access in streams\n * CVE-2020-6391: Insufficient validation of untrusted input in Blink\n * CVE-2020-6392: Insufficient policy enforcement in extensions\n * CVE-2020-6393: Insufficient policy enforcement in Blink\n * CVE-2020-6394: Insufficient policy enforcement in Blink\n * CVE-2020-6395: Out of bounds read in JavaScript\n * CVE-2020-6396: Inappropriate implementation in Skia\n * CVE-2020-6397: Incorrect security UI in sharing\n * CVE-2020-6398: Uninitialized use in PDFium\n * CVE-2020-6399: Insufficient policy enforcement in AppCache\n * CVE-2020-6400: Inappropriate implementation in CORS\n * CVE-2020-6401: Insufficient validation of untrusted input in Omnibox\n * CVE-2020-6402: Insufficient policy enforcement in downloads\n * CVE-2020-6403: Incorrect security UI in Omnibox\n * CVE-2020-6404: Inappropriate implementation in Blink\n * CVE-2020-6405: Out of bounds read in SQLite\n * CVE-2020-6406: Use after free in audio\n * CVE-2019-19923: Out of bounds memory access in SQLite\n * CVE-2020-6408: Insufficient policy enforcement in CORS\n * CVE-2020-6409: Inappropriate implementation in Omnibox\n * CVE-2020-6410: Insufficient policy enforcement in navigation\n * CVE-2020-6411: Insufficient validation of untrusted input in Omnibox\n * CVE-2020-6412: Insufficient validation of untrusted input in Omnibox\n * CVE-2020-6413: Inappropriate implementation in Blink\n * CVE-2020-6414: Insufficient policy enforcement in Safe Browsing\n * CVE-2020-6415: Inappropriate implementation in JavaScript\n * CVE-2020-6416: Insufficient data validation in streams\n * CVE-2020-6417: Inappropriate implementation in installer\n\nre2 was updated to fix:\n\nUpdate to 2020-01-01:\n\n* various developer visible changes\n\nUpdate to 2019-12-01:\n\n* fix latent bugs and undefined behavior\n\nUpdate to 2019-11-01:\n\n* new benchmark API\n\nUpdate to 2019-09-01:\n\n* build system fixes\n\nUpdate to 2019-08-01:\n\n* Update Unicode data to 12.1.0\n* Various developer visible changes\n\nUpdate to 2019-07-01:\n\n* developer visible changes\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-233",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0233-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:0233-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7II7R5BUNZZ5ZN2QJ3UC33I67Y7HE4J2/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:0233-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7II7R5BUNZZ5ZN2QJ3UC33I67Y7HE4J2/"
},
{
"category": "self",
"summary": "SUSE Bug 1162833",
"url": "https://bugzilla.suse.com/1162833"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18197 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19880 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19923 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19925 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19925/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19926 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6381 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6382 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6387 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6388 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6389 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6390 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6391 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6392 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6393 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6394 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6395 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6396 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6396/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6397 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6397/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6398 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6399 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6400 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6400/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6401 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6402 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6403 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6404 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6405 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6406 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6408 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6409 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6409/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6410 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6411 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6411/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6412 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6412/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6413 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6414 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6414/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6415 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6415/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6416 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6417 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6417/"
}
],
"title": "Security update for chromium, re2",
"tracking": {
"current_release_date": "2020-02-19T09:14:43Z",
"generator": {
"date": "2020-02-19T09:14:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:0233-1",
"initial_release_date": "2020-02-19T09:14:43Z",
"revision_history": [
{
"date": "2020-02-19T09:14:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-80.0.3987.87-31.1.aarch64",
"product": {
"name": "chromedriver-80.0.3987.87-31.1.aarch64",
"product_id": "chromedriver-80.0.3987.87-31.1.aarch64"
}
},
{
"category": "product_version",
"name": "chromium-80.0.3987.87-31.1.aarch64",
"product": {
"name": "chromium-80.0.3987.87-31.1.aarch64",
"product_id": "chromium-80.0.3987.87-31.1.aarch64"
}
},
{
"category": "product_version",
"name": "libre2-0-20200101-25.1.aarch64",
"product": {
"name": "libre2-0-20200101-25.1.aarch64",
"product_id": "libre2-0-20200101-25.1.aarch64"
}
},
{
"category": "product_version",
"name": "re2-devel-20200101-25.1.aarch64",
"product": {
"name": "re2-devel-20200101-25.1.aarch64",
"product_id": "re2-devel-20200101-25.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libre2-0-20200101-25.1.ppc64le",
"product": {
"name": "libre2-0-20200101-25.1.ppc64le",
"product_id": "libre2-0-20200101-25.1.ppc64le"
}
},
{
"category": "product_version",
"name": "re2-devel-20200101-25.1.ppc64le",
"product": {
"name": "re2-devel-20200101-25.1.ppc64le",
"product_id": "re2-devel-20200101-25.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libre2-0-20200101-25.1.s390x",
"product": {
"name": "libre2-0-20200101-25.1.s390x",
"product_id": "libre2-0-20200101-25.1.s390x"
}
},
{
"category": "product_version",
"name": "re2-devel-20200101-25.1.s390x",
"product": {
"name": "re2-devel-20200101-25.1.s390x",
"product_id": "re2-devel-20200101-25.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "chromedriver-80.0.3987.87-31.1.x86_64",
"product": {
"name": "chromedriver-80.0.3987.87-31.1.x86_64",
"product_id": "chromedriver-80.0.3987.87-31.1.x86_64"
}
},
{
"category": "product_version",
"name": "chromium-80.0.3987.87-31.1.x86_64",
"product": {
"name": "chromium-80.0.3987.87-31.1.x86_64",
"product_id": "chromium-80.0.3987.87-31.1.x86_64"
}
},
{
"category": "product_version",
"name": "libre2-0-20200101-25.1.x86_64",
"product": {
"name": "libre2-0-20200101-25.1.x86_64",
"product_id": "libre2-0-20200101-25.1.x86_64"
}
},
{
"category": "product_version",
"name": "re2-devel-20200101-25.1.x86_64",
"product": {
"name": "re2-devel-20200101-25.1.x86_64",
"product_id": "re2-devel-20200101-25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 12",
"product": {
"name": "SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Package Hub 12 SP3",
"product": {
"name": "SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-80.0.3987.87-31.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64"
},
"product_reference": "chromedriver-80.0.3987.87-31.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-80.0.3987.87-31.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64"
},
"product_reference": "chromedriver-80.0.3987.87-31.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-80.0.3987.87-31.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64"
},
"product_reference": "chromium-80.0.3987.87-31.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-80.0.3987.87-31.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64"
},
"product_reference": "chromium-80.0.3987.87-31.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-0-20200101-25.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64"
},
"product_reference": "libre2-0-20200101-25.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-0-20200101-25.1.ppc64le as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le"
},
"product_reference": "libre2-0-20200101-25.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-0-20200101-25.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libre2-0-20200101-25.1.s390x"
},
"product_reference": "libre2-0-20200101-25.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-0-20200101-25.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64"
},
"product_reference": "libre2-0-20200101-25.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20200101-25.1.aarch64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64"
},
"product_reference": "re2-devel-20200101-25.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20200101-25.1.ppc64le as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le"
},
"product_reference": "re2-devel-20200101-25.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20200101-25.1.s390x as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:re2-devel-20200101-25.1.s390x"
},
"product_reference": "re2-devel-20200101-25.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20200101-25.1.x86_64 as component of SUSE Package Hub 12",
"product_id": "SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
},
"product_reference": "re2-devel-20200101-25.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-80.0.3987.87-31.1.aarch64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64"
},
"product_reference": "chromedriver-80.0.3987.87-31.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromedriver-80.0.3987.87-31.1.x86_64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64"
},
"product_reference": "chromedriver-80.0.3987.87-31.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-80.0.3987.87-31.1.aarch64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64"
},
"product_reference": "chromium-80.0.3987.87-31.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "chromium-80.0.3987.87-31.1.x86_64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64"
},
"product_reference": "chromium-80.0.3987.87-31.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-0-20200101-25.1.aarch64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64"
},
"product_reference": "libre2-0-20200101-25.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-0-20200101-25.1.ppc64le as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le"
},
"product_reference": "libre2-0-20200101-25.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-0-20200101-25.1.s390x as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x"
},
"product_reference": "libre2-0-20200101-25.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-0-20200101-25.1.x86_64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64"
},
"product_reference": "libre2-0-20200101-25.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20200101-25.1.aarch64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64"
},
"product_reference": "re2-devel-20200101-25.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20200101-25.1.ppc64le as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le"
},
"product_reference": "re2-devel-20200101-25.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20200101-25.1.s390x as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x"
},
"product_reference": "re2-devel-20200101-25.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20200101-25.1.x86_64 as component of SUSE Package Hub 12 SP3",
"product_id": "SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64"
},
"product_reference": "re2-devel-20200101-25.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-18197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18197"
}
],
"notes": [
{
"category": "general",
"text": "In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn\u0027t reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18197",
"url": "https://www.suse.com/security/cve/CVE-2019-18197"
},
{
"category": "external",
"summary": "SUSE Bug 1154609 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1154609"
},
{
"category": "external",
"summary": "SUSE Bug 1157028 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1157028"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1162833"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1190108 for CVE-2019-18197",
"url": "https://bugzilla.suse.com/1190108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2019-18197"
},
{
"cve": "CVE-2019-19880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19880"
}
],
"notes": [
{
"category": "general",
"text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19880",
"url": "https://www.suse.com/security/cve/CVE-2019-19880"
},
{
"category": "external",
"summary": "SUSE Bug 1159491 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1159491"
},
{
"category": "external",
"summary": "SUSE Bug 1159715 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1159715"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19880",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2019-19880"
},
{
"cve": "CVE-2019-19923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19923"
}
],
"notes": [
{
"category": "general",
"text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19923",
"url": "https://www.suse.com/security/cve/CVE-2019-19923"
},
{
"category": "external",
"summary": "SUSE Bug 1160309 for CVE-2019-19923",
"url": "https://bugzilla.suse.com/1160309"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19923",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-19923"
},
{
"cve": "CVE-2019-19925",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19925"
}
],
"notes": [
{
"category": "general",
"text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19925",
"url": "https://www.suse.com/security/cve/CVE-2019-19925"
},
{
"category": "external",
"summary": "SUSE Bug 1159847 for CVE-2019-19925",
"url": "https://bugzilla.suse.com/1159847"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19925",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "low"
}
],
"title": "CVE-2019-19925"
},
{
"cve": "CVE-2019-19926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19926"
}
],
"notes": [
{
"category": "general",
"text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19926",
"url": "https://www.suse.com/security/cve/CVE-2019-19926"
},
{
"category": "external",
"summary": "SUSE Bug 1159491 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1159491"
},
{
"category": "external",
"summary": "SUSE Bug 1159715 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1159715"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2019-19926",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2019-19926"
},
{
"cve": "CVE-2020-6381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6381"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6381",
"url": "https://www.suse.com/security/cve/CVE-2020-6381"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6381",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6381"
},
{
"cve": "CVE-2020-6382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6382"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6382",
"url": "https://www.suse.com/security/cve/CVE-2020-6382"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6382",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6382"
},
{
"cve": "CVE-2020-6385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6385"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6385",
"url": "https://www.suse.com/security/cve/CVE-2020-6385"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6385",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6385"
},
{
"cve": "CVE-2020-6387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6387"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6387",
"url": "https://www.suse.com/security/cve/CVE-2020-6387"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6387",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6387"
},
{
"cve": "CVE-2020-6388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6388"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6388",
"url": "https://www.suse.com/security/cve/CVE-2020-6388"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6388",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6388"
},
{
"cve": "CVE-2020-6389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6389"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6389",
"url": "https://www.suse.com/security/cve/CVE-2020-6389"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6389",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6389"
},
{
"cve": "CVE-2020-6390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6390"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6390",
"url": "https://www.suse.com/security/cve/CVE-2020-6390"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6390",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6390"
},
{
"cve": "CVE-2020-6391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6391"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6391",
"url": "https://www.suse.com/security/cve/CVE-2020-6391"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6391",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6391"
},
{
"cve": "CVE-2020-6392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6392"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6392",
"url": "https://www.suse.com/security/cve/CVE-2020-6392"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6392",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6392"
},
{
"cve": "CVE-2020-6393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6393"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6393",
"url": "https://www.suse.com/security/cve/CVE-2020-6393"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6393",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6393"
},
{
"cve": "CVE-2020-6394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6394"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6394",
"url": "https://www.suse.com/security/cve/CVE-2020-6394"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6394",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6394"
},
{
"cve": "CVE-2020-6395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6395"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6395",
"url": "https://www.suse.com/security/cve/CVE-2020-6395"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6395",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6395"
},
{
"cve": "CVE-2020-6396",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6396"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6396",
"url": "https://www.suse.com/security/cve/CVE-2020-6396"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6396",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6396"
},
{
"cve": "CVE-2020-6397",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6397"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6397",
"url": "https://www.suse.com/security/cve/CVE-2020-6397"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6397",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6397"
},
{
"cve": "CVE-2020-6398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6398"
}
],
"notes": [
{
"category": "general",
"text": "Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6398",
"url": "https://www.suse.com/security/cve/CVE-2020-6398"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6398",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6398"
},
{
"cve": "CVE-2020-6399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6399"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6399",
"url": "https://www.suse.com/security/cve/CVE-2020-6399"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6399",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6399"
},
{
"cve": "CVE-2020-6400",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6400"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6400",
"url": "https://www.suse.com/security/cve/CVE-2020-6400"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6400",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6400"
},
{
"cve": "CVE-2020-6401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6401"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6401",
"url": "https://www.suse.com/security/cve/CVE-2020-6401"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6401",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6401"
},
{
"cve": "CVE-2020-6402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6402"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6402",
"url": "https://www.suse.com/security/cve/CVE-2020-6402"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6402",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6402"
},
{
"cve": "CVE-2020-6403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6403"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6403",
"url": "https://www.suse.com/security/cve/CVE-2020-6403"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6403",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6403"
},
{
"cve": "CVE-2020-6404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6404"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6404",
"url": "https://www.suse.com/security/cve/CVE-2020-6404"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6404",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6404"
},
{
"cve": "CVE-2020-6405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6405"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6405",
"url": "https://www.suse.com/security/cve/CVE-2020-6405"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6405",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6405"
},
{
"cve": "CVE-2020-6406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6406"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6406",
"url": "https://www.suse.com/security/cve/CVE-2020-6406"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6406",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6406"
},
{
"cve": "CVE-2020-6408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6408"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6408",
"url": "https://www.suse.com/security/cve/CVE-2020-6408"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6408",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6408"
},
{
"cve": "CVE-2020-6409",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6409"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6409",
"url": "https://www.suse.com/security/cve/CVE-2020-6409"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6409",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6409"
},
{
"cve": "CVE-2020-6410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6410"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6410",
"url": "https://www.suse.com/security/cve/CVE-2020-6410"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6410",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6410"
},
{
"cve": "CVE-2020-6411",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6411"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6411",
"url": "https://www.suse.com/security/cve/CVE-2020-6411"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6411",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6411"
},
{
"cve": "CVE-2020-6412",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6412"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6412",
"url": "https://www.suse.com/security/cve/CVE-2020-6412"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6412",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6412"
},
{
"cve": "CVE-2020-6413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6413"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6413",
"url": "https://www.suse.com/security/cve/CVE-2020-6413"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6413",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6413"
},
{
"cve": "CVE-2020-6414",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6414"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6414",
"url": "https://www.suse.com/security/cve/CVE-2020-6414"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6414",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6414"
},
{
"cve": "CVE-2020-6415",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6415"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6415",
"url": "https://www.suse.com/security/cve/CVE-2020-6415"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6415",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6415"
},
{
"cve": "CVE-2020-6416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6416"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6416",
"url": "https://www.suse.com/security/cve/CVE-2020-6416"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6416",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6416"
},
{
"cve": "CVE-2020-6417",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6417"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6417",
"url": "https://www.suse.com/security/cve/CVE-2020-6417"
},
{
"category": "external",
"summary": "SUSE Bug 1162833 for CVE-2020-6417",
"url": "https://bugzilla.suse.com/1162833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12 SP3:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12 SP3:re2-devel-20200101-25.1.x86_64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromedriver-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.aarch64",
"SUSE Package Hub 12:chromium-80.0.3987.87-31.1.x86_64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.aarch64",
"SUSE Package Hub 12:libre2-0-20200101-25.1.ppc64le",
"SUSE Package Hub 12:libre2-0-20200101-25.1.s390x",
"SUSE Package Hub 12:libre2-0-20200101-25.1.x86_64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.aarch64",
"SUSE Package Hub 12:re2-devel-20200101-25.1.ppc64le",
"SUSE Package Hub 12:re2-devel-20200101-25.1.s390x",
"SUSE Package Hub 12:re2-devel-20200101-25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-19T09:14:43Z",
"details": "important"
}
],
"title": "CVE-2020-6417"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.